US5917925A - System for dispensing, verifying and tracking postage and other information on mailpieces - Google Patents

System for dispensing, verifying and tracking postage and other information on mailpieces Download PDF

Info

Publication number
US5917925A
US5917925A US08/911,108 US91110897A US5917925A US 5917925 A US5917925 A US 5917925A US 91110897 A US91110897 A US 91110897A US 5917925 A US5917925 A US 5917925A
Authority
US
United States
Prior art keywords
symbol
indicia
host computer
control computer
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US08/911,108
Inventor
Lewis J. Moore
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/420,034 external-priority patent/US5592561A/en
Priority claimed from US08/633,538 external-priority patent/US6005960A/en
Priority claimed from US08/740,656 external-priority patent/US5895073A/en
Application filed by Individual filed Critical Individual
Priority to US08/911,108 priority Critical patent/US5917925A/en
Application granted granted Critical
Publication of US5917925A publication Critical patent/US5917925A/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00435Details specific to central, non-customer apparatus, e.g. servers at post office or vendor
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00435Details specific to central, non-customer apparatus, e.g. servers at post office or vendor
    • G07B2017/00443Verification of mailpieces, e.g. by checking databases

Definitions

  • the present invention relates to an authenticating, anti-counterfeiting, and tracking system. More particularly, the present invention relates to a system for marking postage which is a substitute for a postage stamp or a prior art postage meter imprint as evidence of the fact that postage has been paid on mailpieces.
  • counterfeit articles It is common for the counterfeit articles to be of high quality and closely resemble authentic articles. Indeed, counterfeit articles, such as postage stamps, can so closely resemble genuine goods that postal processors readily confuse the counterfeit articles with the authentic articles.
  • a system and method which enable a user to avoid using postage stamps and instead encode mailpieces with authenticity data by affixing a mark or symbol, and to enable remote postage processing stations to check the marks or symbols, whether affixed to packages or letters or the like, for authenticity thereby indicating that proper postage has been paid.
  • the mark or symbol contain other data such as data used in tracking the mail piece, the origin of the mailpiece, the date of marking, the weigh of the mailpiece, and the like.
  • such a comprehensive system was not available.
  • Prior art postage meters also lack proper security. There are approximately 1.5 million postage meters in use in the united States alone, which collectively account for approximately $20 billion in postal revenue annually. These meters affix a mark to mailpieces, and are designed to tabulate and record the amount of postage fee disbursed. Such meters are made by several vendors, and are thought to provide inadequate security against fraudulent use to avoid postage payment by physical tampering. In addition, the affixed marks are counterfeited to avoid postage fee payment, and such counterfeit marks are very difficult to readily detect by postal processors. In summary, a secure postal metering system which requires input from the user, the vendor, and the postal service has heretofore not been available.
  • U.S. Pat. No. 5,289,547 discloses a method for authenticating articles including incorporating into a carrier composition a mixture of at least two photochromic compounds that have different absorption maxima in the activated state and other different properties to form the authenticating display data on the article, subjecting the display data to various steps of the authenticating method, activation of all photochromic compounds, preferential bleaching of less than all of the photochromic compounds, and/or bleaching of all the photochromic compounds, and subsequent examination of the display data following the various activation and bleaching steps by verifying means to enable authentication.
  • U.S. Pat. No. 4,767,205 discloses an identification method and identification kit based upon making up groups of microsized particles normally visible to the naked eye with each particle in each group being of a selected uniform size, shape and color. Coded identification is established by transferring a population of particles from a selected number of the groups to the item to be identified and then confirming such identification by examining the marked item under high magnification with a light microscope.
  • U.S. Pat. No. 4,623,579 discloses a decorative composite article which may be longitudinally slit to form a yarn product which has a combined phosphorescent and fluorescent decorative appearance.
  • the composite article includes paired outer layers of a thermoplastic resin between which is disposed a decorative layer comprising a composition including a colorant component having a phosphorescent colorant and a fluorescent colorant, and a resin binder material.
  • the fluorescent colorant is present in an amount by weight that is up to an amount equal to that of the phosphorescent colorant.
  • the present binder material may be selected from polyester, polyurethane and acrylic polymers and copolymers, with a mixture of butadiene-acrylonitrile rubber and polyurethane composition being preferred.
  • the composite article is prepared by coating two resin films with the composition, followed by contacting the films with each other on their coated surfaces and applying heat and pressure to bond them together to form the decorative composite article.
  • U.S. Pat. No. 3,942,154 issued on Mar. 2, 1976, discloses a method and apparatus for recognizing colored patterns.
  • the method includes encoding the colors of individual picture elements in a fabric pattern by comparing the level of transmittance or reflectance of the picture element at pre-selected wavelengths with stored values representing a reference color to generate a multibit code indicative of the color of the picture element.
  • a comparator used for this purpose incorporates an error either proportional to the wavelength or of constant value so that the output of the comparator will indicate identity with the stored value if the input value for the picture element is within a certain range of the stored value.
  • U.S. Pat. No. 3,839,637 issued on Oct. 1, 1974, discloses the impregnation of spaced courses of yarn in a fabric with a material which is not visible under daylight, but which is visible only when subjected to ultra-violet light, so as to provide guide lines for cutting, or measuring indicia to enable visual counting of the number of yards of cloth in a roll from the end thereof without the necessity of unrolling the bolt.
  • U.S. Pat. No. 3,701,165 issued on Oct. 31, 1972, discloses a method of marking garments with a substance detectable by magnetic detecting devices. When the magnetized substance on the garment part is detected in a process of making garments, subsequent garment making steps are actuated in response to the detection of the stitching.
  • U.S. Pat. No. 5,289,547 discloses a method of cutting a sheet with a tool controlled by a computer system and in accordance with a cutting program wherein an operator marks certain particularities directly on the sheet using a fluorescent marker, the sheet is exposed to ultraviolet light while being scanned by a camera, the marking being interpretable as constraints on cutting to be taken into account by the cutting program, and cutting occurs following the instructions interpreted from the encoded pattern.
  • U.S. Pat. No. 3,991,706, issued on Nov. 16, 1976, discloses an automatically controlled cutting machine having a support table on which limp sheet material is spread for cutting by means of a cutting tool and includes a marking apparatus to identify key points on pattern pieces cut from the sheet material.
  • the cutting tool and the marking apparatus are mounted on a tool platform for movement to any desired location over the sheet material.
  • the marking apparatus utilizes a needle which is suspended above the sheet material and a dye thread which is laced through an eyelet in the depending end of the needle. Each time a mark is to be generated, the needle plunges downwardly through the sheet material, and dye on the thread is rubbed onto the material at the point under consideration.
  • An indexing mechanism operated with the reciprocating movement of the needle pulls a finite length of thread through the eyelet after each marking operation.
  • the marks should verify authenticity and that the proper postal fee has been paid.
  • the mark also specify other information such as the origin and the final point or points of distribution of the mailpieces.
  • the markings should be durable and preferably resistant to normal wear and abrasion encountered in the processing and distribution of mailpieces. Still further, the markings should be relatively difficult to remove and, if removed, should preferably render the mailpiece essentially undeliverable or in a condition which prevents distribution if tampered with.
  • the present invention provides an authenticating, tracking, and anti-counterfeiting indicia system which can track various goods.
  • the system is directed toward marking, tracking, and postal fee collection of mailpieces, but can be used to authenticate and track a wide variety of goods and articles of manufacture.
  • the system includes a control computer, one or more host computers which cooperate with the control computer, a marking system, and a field reader system, which are all compatible and can be physically linked via data transmission links.
  • An identifiable mark is placed on the mailpieces, goods, products, packages of goods, or on materials out of which the goods are to be made, which enables subsequent inspection.
  • the mailpieces, goods or materials can be field inspected with a field reader to verify proper fee payment, to determine the authenticity of the mark or the goods, or to track the distribution of the mailpieces, goods or articles, and to determine the final point of distribution of the marked items.
  • the control computer is under control of the IBIP vendor and the postal service.
  • the host computer is centrally located.
  • Each participant in the IBIP hereafter referred to as the "customer" possesses a host computer which, in turn, controls one or more indicia printers.
  • Each host computer is isolated from the control computer by a postal security device preferably in the form of an enigma card. This prevents access by one customer to another customer's confidential information by routing through the control computer.
  • Each indicia printer under the control of the host computer, affixes a mark mailpieces.
  • the mark is preferably a two dimensional encrypted matrix.
  • the host computer and indicia printer therefore replaces the prior art postage meter, or replaces the manual affixation of postage stamps to mailpieces.
  • an on-site or "field” reader captures or "reads” the mark and decodes the mark to preferably an ASCII string.
  • the field reader then transmits the ASCII string to the control computer and to the appropriate customer host computer, wherein the mark is compared with marks residing in a database in the control computer and compared with a lesser, customer specific database residing in the customer's host computer.
  • An authenticating match, and authentication of other data contained in the mark such as the identifier of an authorized customer, may or may not be obtained from the comparison. Results of these comparisons are then transmitted back to the field reader and displayed preferably in clear text.
  • portions of the indicia can be printed with ink which is visible only in light outside of the visible range.
  • This portion of the indicia might contain distribution information or the like which is needed by the postal service and the customer, but is otherwise confidential.
  • Postal inspectors uses light outside the visible spectrum to briefly illuminate indicia marks on the mailpieces under inspection. Through the use of responsive chemical agents such as dyes, that on exposure to non-visible light undergo a chemical, physical, and/or chemical-physical transformation making the marks detectable, an inspector can quickly read that portion of the mark and ascertain the desired information.
  • a unique indicia mark, symbol, or pattern encoding specific identification data can be tailored to meet the needs of a particular customer as well as the postal service.
  • the mark contains specific information which is unique to the mailpiece, not readily observable in visible light and which can be rendered detectable and readable upon exposure to non-visible light.
  • the pattern can be scanned or captured by a reader and deciphered into encoded data. The entry can then either be compared directly to a set of authentic entries on a database or decoded and the decoded data compared to a set of data on the centrally located host database. In comparing captured patterns with authentic patterns within a host database, the total pattern can be transmitted to the host, or alternately, the pattern image can be decoded by the field reader and transmitted as an ASCII string to the host for authentication. In still another embodiment, the symbol pattern is decoded by the field reader and identified with readable or "clear" text on a screen of the field reader. In this embodiment, authentication of the mark is not made at the host computer.
  • the -system of the present invention is generally comprised of a control computer, and a plurality of host computers with one host computer generally being under the control of one customer.
  • the control computer creates each indicium using data provided by the postal security device and the customer, supports communication with the vendor's infrastructure, provides customer interface, employs current postage rates, supports the use of standard mailing addresses, and maintains records regarding host system use.
  • Each host computer stores the specific, selected information conveyed by the indicia mark which is "customer specific", and directs the indicia printer to imprint the mark on the mailpiece, and also receives and processes information from the reading system.
  • the indicia printer can imprint the mark on an item which is subsequently attached permanently to the mailpiece, such as a gummed paper indicia mark akin to current postage stamps.
  • Each host computer is connected via modem and through a postal security device to coordinate, receive, and respond to commands sent and received from the control computer, one or more indicia printer terminals, and one or more reading terminal.
  • the control computer contacts a host computer through a postal security device enigma card and enables a specific amount of postage fee, preferably equal to a prepaid amount.
  • the host computer establishes an appropriate identifying message, using clear text, such as the amount of "postage" to be imprinted as an indicium on a mailpiece based upon current postal rates, the weight of the piece, the destination of the piece, and the like.
  • the host interfaces with an encryption unit which converts the clear text message into a two dimensional matrix symbol indicia.
  • the host downloads the digital symbol to the CPU controlling the indicia printer.
  • the host preferably establishes marker start/stop serialized codes and specific times the indicia printer or printers can be in operation in order to discourage unauthorized usage.
  • a CCD camera mounted downstream from the printer maintains a continuous validation step that an appropriate indicia is being printed onto the mailpiece. If the printed indicia is different from that provided by the CPU, an error signal is activated to alert the operator.
  • the CCD camera can also be used to decode the imprinted two dimensional matrix and convert the decoded data into an ASCII string, which can then be stored in the host database. This is important when the piece is marked with an encrypted matrix which, as an example, may include postage rate and a destination code before an actual destination has been assigned to that destination code.
  • the marker CPU uploads a print count, preferably indicating the cumulative postage fee disbursed during the cycle, to the host.
  • marked mailpieces can be identified and verified through the use of field readers.
  • the indicia can be imprinted directly on the mailpiece or, alternately, can be imprinted on a fixture which is affixed to the mailpiece. Gummed paper labels are examples of such affixed fixtures.
  • the mailpieces are identified and verified by using a light of appropriate wavelength to illuminate the indicia on the mailpiece. The illuminated indicia is captured by the camera. The captured image is then transferred to a portable PC where the data is enhanced if necessary, compressed, and transmitted via modem, cellular link, or satellite communication to the host computer and to the control computer.
  • the illuminated indicia can be decoded into an ASCII string at the portable PC which may be sufficient for identification, or the ASCII string can be transmitted back to the host for authentication rather than having to transmit the much larger, though compressed, bitmap file.
  • the control computer and appropriate host computer receives the data from the field reader, interfaces with the encryption unit where the message is decoded and converted to clear text.
  • the control and host computers then search their databases to validate the indicia message and any customer specific information, respectively. Once validated, the control computer sends a message back to the field reader which displays the decoded message and any other pertinent information pertaining to this specific mailpiece. If the marked is counterfeit, or if the indicia mark is found to be authentic used without authorization (e.g. without paying the proper underlying postage fee), an invalid signal is transmitted and displayed on the field reader computer screen. Alternately, the symbol can be decoded within the field reader computer, and the decoded data can be displayed on the field reader computer screen. In this embodiment, no comparison is made in the control computer
  • the control computer provides an allotment of postage to the host computer. This communication is carried out via corresponding postal security device enigma cards which are located in the respective host computers. Once each host computer has received an allotment of postage, it is able to enable indicia printer or printers to imprint indicia on the articles or mailpieces as specified. Each host computer is limited in its ability to enable the indicia printing systems to impart marks to the extent that the control computer has provided to the host the requisite number of postage to cover the directions sent to the marking systems. As an example, only a controlled and specified amount of postage can be printed as indicia marks with final "mailing" address (specified by the customer) at a given mail room. Using the disclosed invention, even an employee of the customer can not, therefore, clandestinely "stamp" additional mailpieces to that or another address.
  • Each host computer interfaces with the encryption unit to generate a data matrix symbology which includes specified information that the customer selects represented by indicia, in addition to the information required by the postal service.
  • Information selectable by the customer is entered into the customer's host computer terminal.
  • the encoded indicia is sent via modem to a specific printing site where the encoded marks received by the indicia printer and is printed on the mailpiece at the printing location which is typically remote from the control computer.
  • This matrix is downloaded to the indicia printer for marking the mailpieces.
  • a verification of the printed indicia is conducted by a camera which compares the mark as printed with the mark directed by the printer PC.
  • the mailpieces are then ready to enter the postal system where they can be scanned at various steps in processing and distribution by a field reader to verify authentic indicia.
  • a field reader to verify authentic indicia.
  • communication is established by the reader with the control computer and also the host computer.
  • the control computer verifies authenticity against the postal service data base criteria.
  • the host computer compares the scanned mark with marks in its database to determine the authenticity or obtain tracking information based upon the customer's criteria.
  • the "customer” can also be a PC-based "home office” equipped with a postal security device (PSD), encryption software, and a standard PC operated printer.
  • PSD postal security device
  • the present invention also provides apparatus and methods for controlling and enabling the authentication and tracking of other material or items such as consumer goods to reduce the amount of counterfeit goods and to reduce the shipping of authentic goods to unauthorized points of final distribution.
  • the method includes generating a unique pattern comprising an encoded input data entry stored on a mass storage device accessible by a CPU where the input data comprises a final point of distribution and a unique manufacturer identifier, and where the encoded data entry comprises a digital encoding of the input data.
  • the unique pattern is preferably applied to mailpieces of the goods using an ink formulation comprising one or more chemical agents detectable when exposed to a visible or non-visible wavelength range of light.
  • Non-visible ink can be selected such that the pattern can be "overprinted” on other marks which are visible under normal light conditions, and these overprinted marks can subsequently be read without interference from the visible markings.
  • the pattern is applied to the goods or mailpieces by other methods such as etching, printing, painting or embossing.
  • the pattern can also be applied with an ink jet or thermal printer.
  • the method further comprises exposing the marked items with light in the visible or non-visible frequency range thereby making the pattern detectable, scanning the detectable pattern on the goods, decoding the pattern to retrieve the encoded data, and comparing the encoded data against stored encoded input data entries in the mass storage device data to determine if the goods are authentic and if the specified destination is correct.
  • the present invention provides apparatus and methods for marking the final point of distribution of mailpieces or consumer goods, and a method for verifying the final destination of mailpieces or goods, including a means for generating a unique pattern comprising an encoded input data entry stored on a mass storage device accessible by a CPU where the input data comprises at least a unique destination identifier and where the encoded data entry comprises a digital encoding of the input data, a means for applying the unique pattern to the goods using an ink formulation comprising one or more chemical agents detectable when exposed to a visible or non-visible frequency range of light, a means for exposing the goods with light in the visible or non-visible frequency range thereby making the pattern detectable, scanning the detectable pattern on the goods, a means for decoding the pattern to retrieve the encoded input data entry, and a means for comparing the encoded input data entry against all stored encoded input data entries in the mass storage device data to determine whether the goods are authentic and properly distributed.
  • the present invention also provides a method for authenticating indicia marks to reduce the amount of counterfeit marks including entering input data, by the customer, comprising at least a unique customer identifier and/or entering input data, by the postal service, comprising a unique postal service identifier into a CPU, encoding the data in a machine readable format, storing the data in a mass storage device accessible to the CPU, generating a unique pattern incorporating the encoded input data, and applying the unique pattern as an indicia mark to mailpieces using an ink formulation comprising one or more chemical agents detectable when exposed to a visible or non-visible frequency range of light.
  • the unique pattern can be printed on a fixture which is permanently affixed to the mailpiece.
  • the authentication process is completed by exposing the goods to light in the visible or non-visible frequency range thereby making the pattern detectable, scanning the detectable pattern on the mailpiece or on a fixture affixed to the mailpiece, degenerating the pattern to retrieve the encoded input data, transmitting the total image pattern or alternately transmitting a representative ASCII string, decoding the encoded data to retrieve the input data, and comparing the input data against all stored input in the mass storage device data to determine whether the indicia are authentic.
  • the scanned pattern can be directly decoded in clear text for display and for evaluation at the location of scanning, and without comparison against marks stored in the host or control computer databases.
  • the present invention also provides an authenticating system including a means for entering input data comprising at least a unique destination identifier and/or a unique customer identifier into a CPU, a means for encoding the data in a machine readable format, a means for storing the data in a mass storage device accessible to the CPU, a means for generating a unique pattern incorporating the encoded input data, a means for applying the unique pattern as an indicia mark to mailpieces or to a fixture attached thereto by printing using an ink formulation comprising one or more chemical agents detectable when exposed to a non-visible frequency range of light, a means for exposing the goods with light in the non-visible frequency range thereby making the pattern detectable.
  • the present invention also provides a means for scanning the detectable pattern on the mailpieces, a means for degenerating the pattern to retrieve the encoded input data, a means for decoding the encoded data to retrieve the input data, and a means for comparing the input data against all stored input data in the mass storage device to determine whether the goods are authentic and are at the specified final point of mailpiece delivery.
  • the present invention further provides a method for monitoring the flow of mailpieces through a postal processing and delivery system including generating a unique pattern comprising an encoded input data entry stored on a mass storage device accessible by a CPU where the input data comprises one or more of a unique postal service identifiers, a unique customer identifier, a unique point of mailing identifier, a unique destination identifier, a unique postage amount, an unique mailpiece weight, and time and date information and where the encoded data entry comprises a digital encoding of the input data, applying the unique pattern to the mailpieces, or to a fixture attached to the mailpieces, by printing using an ink formulation comprising one or more chemical agents detectable when exposed to a visible or non-visible frequency range of light, exposing the goods with light in the visible or non-visible frequency range thereby making the pattern detectable.
  • the present invention further provides means for scanning the detectable pattern on the mailpieces or fixture attached thereto, degenerating the pattern to retrieve the encoded input data entry, and decoding the encoded data
  • the present disclosure provides an authenticating and/or tracking system in which an indicia pattern is placed on mailpieces, or alternately placed on a fixture attached to the mailpieces, wherein a portion of the symbol is not visible on the mailpiece under normal light conditions.
  • the symbol be relatively resistant to removal by abrasion during the processing and distribution of the mailpieces.
  • the indicia mark be relatively immune to tampering and removal, preferably rendering the mailpiece on which it is printed or to which it is attached undeliverable if tampered with or removed.
  • the symbol may be detectable in visible light or, alternately, only portions detectable under visible light and portions detectable upon exposure to certain wavelengths of non-visible light such as UV light, IR light, microwaves, radiowaves, or other frequencies of light.
  • FIG. 1a illustrates the geographical layout and major components of the invention, configured as a postal indicia system, using a functional block diagram;
  • FIG. 1b is a schematic block diagram showing a portion of the system, utilizing a single host computer, which both marks items with encoded indicia symbols, stores the symbols in machine readable format for easy recall and comparison, and subsequently reads the symbols in accordance with the teachings of the present disclosure;
  • FIG. 2 shows a portion of an item and a location for applying the encoded patterns or symbols
  • FIG. 3 shows a representative indicia symbol placed on an item
  • FIG. 3a shows a representative indicia symbol placed on an item
  • FIG. 3b shows a representative indicia symbol placed on an item
  • FIG. 4a is a back view of an indicia printing machine in accordance with the teachings of the present disclosure
  • FIG. 4b is a side view of an indicia printing machine in accordance with the teachings of the present disclosure.
  • FIG. 4c is a top view of an indicia printing machine in accordance with the teachings of the present disclosure.
  • FIG. 5 is a top view of a item carrier detailing the vacuum ports
  • FIG. 6 is a side view of a hand held field reader.
  • the system of the present invention generally comprises four components: (1) a control or "master” computer which is located at a central location and which enables the entire system; (2) preferably a plurality of host computer located at a geographically diverse locations; (3) a plurality of marking systems or "indicia printers” cooperating with each host computer; and (4) preferably a plurality of portable field readers cooperating with each host computer, the control computer, or both the hosts and control computers.
  • FIG. 1a illustrates the layout of the invention, embodied as a postal indicia marking system, using a functional block diagram.
  • U.S.P.S. United States Postal Service
  • the system replaces prior art postage meters and postage stamps as means for indicating that proper mail fee has been paid for each mailpiece.
  • the components communicate so that one or all components can be located at sites far removed or "remote" from one another. In the example shown in FIG.
  • the control computer 12 is indicated by a broken line box which encompasses a box 12' representing the manufacturer or "vendor" of the system, and the U.S.P.S. 12" which is the director of the system.
  • the control computer 12 can be located at the system vendor's headquarters, or even at the postal service headquarters. Data are readily transferred between the U.S.P.S and the vendor. Stated another way, the control computer 12 is typically controlled by the U.S.P.S even though it may be physically located at the vendor's place of business. Alternately, there can be more than one vendor of the indicia marking service, and therefore there can be more than one control computer 12 with all being under control of the U.S.P.S.
  • control computer 12 cooperates with a plurality of host computers through a modem 11.
  • host computers 14', 14 and 14" are shown, but it should be understood that any number "X" of host computers can be employed.
  • each host computer is controlled by a single user or "customer" of the service, which can be located anywhere within the United States or even abroad.
  • each host computer cooperates with the control computer 12 through a postal security device (PSD) which is typically an enigma card as will be detailed in subsequent sections.
  • PSD postal security device
  • host computer 14' if functionally cooperative with the control computer 12 through a PSD 400'.
  • the PSD units secure confidential information, belonging to the vendor 12' or the U.S.P.S 12" and stored in the control computer 12, from being accessed by the various user companies through their host computers.
  • the PSD units insulate the plurality of host computers from the control computer 12 so that confidential information from one host computer controlled by one company can not be clandestinely or inadvertently transferred to the host computer of another company via the control computer.
  • the control computer can be used by the postal service or by the vendor to conduct electronic audits of all PSD units, i.e. enigma cards contained in or attached to the various host computers.
  • each host computer controls one or more indicia printers. For purposes of clarity, only one indicia printer is shown cooperating with each host computer.
  • host computer 14' belonging to customer "1" controls the indicia printer 20'
  • the indicia printer marks the mailpieces with an encoded mark indicating first that the proper postal fee has been paid in order to "mail" the mailpiece.
  • This marking process is essentially “tamper proof” when compared with current postage metering systems and convention postage stamping methods. This saves the postal service, as well as the customers, considerable sums of money which would normally be lost to postage fraud.
  • the indicia printer can also encode information in addition evidence that the proper postal fee has been paid for the mailpiece.
  • This information can be supplied by the postal service, by the customer, or even by the vendor. Such information includes a dates and times of processing, locations of processing, accounting information, standardized addresses, audit functions, authorization codes and the like. This input is possible because the customers, the vendor (or vendors) and the postal service all have input capability within the system.
  • the mailpieces enter the mail system 402 as illustrated conceptually in FIG. 1a.
  • the indicia mark affixed to the mail piece can be read on site with a U.S.P.S. filed reader 18. All information contained in the indicia mark is used on site, transmitted back to the appropriate host computer if the information pertains directly to the customer or is "customer specific", or transmitted back to the control computer 12 if the information pertains to the postal service operation or even the vendor's operation. Operational details and system capabilities will be detailed in subsequent sections of this disclosure.
  • FIG. 1b provides a more detailed schematic diagram that represents a single host computer 14, and related components, of the present invention.
  • the numeral 10 generally identifies the authenticating, anti-counterfeiting, anti-diversion system for indicia marking and tracking mailpieces and other goods.
  • the single host computer is identified by the numeral 14, and stores the selected, customer specific information conveyed by the indicia mark and directs the indicia printing system 16 to incorporate that information into the indicia mark on the mailpiece module.
  • the control computer 12 supplies the postal service information to be included in the indicia mark.
  • the host computer 14 also receives and processes customer and postal service specific information from the reading system 18.
  • the host computer 14 is connected via modem 11 through a PSD 400 to coordinate, receive, and respond to postal service data and commands sent and received from the control computer 12, and is also connected to a marker terminal or processing unit CPU 27 in the indicia printer 16, and to a reading terminal 22, preferably a personal computer. Connection can also be accomplished by making the system an integral part of local and wide area networks (LANs and WANs), or even the Internet.
  • LANs and WANs wide area networks
  • the control computer 12 contacts the host computer 14 and enables a specific number of imprints or, alternately, to distribute a specific amount of postal fee.
  • the control computer may enable the host to imprint 100,000 32 cent mail piece indicia.
  • the host computer establishes an appropriate identifying message using clear text.
  • the host computer 14 interfaces with an encryption unit 15 which converts the clear text message into an ID matrix symbol.
  • the host computer then downloads the digital symbol to the marker CPU 27 controlling the marker 20 which, for purposes of discussion, is a printer.
  • the host also establishes printer start/stop serialized numbers and specific times the printer can be in operation, i.e., 0800-1600, Monday through Friday.
  • the host downloads the ID string and a "start" and "end” count to the CPU 27.
  • the CPU's software encrypts the ID string including the serialized counts starting with the "start” count and stopping with the "end” count.
  • a CCD camera 28 mounted downstream from the printer in the marking process maintains a continuous validation that an appropriate indicia symbol is being printed onto the product. If the printed symbol is different from that provided by the marker CPU 27, an error signal is activated to alert the operator.
  • the printer CPU uploads a print count to the host.
  • the postal service or the vendor can conduct electronic audits of all host computers at any time.
  • marked mailpieces can be identified and verified through the use of the field reader system 18.
  • a plurality of field readers cooperate with a single host computer 14 and with the control computer 12, and are at locations remote from the host and control computers.
  • the mailpieces can be marked directly, or that one or more fixtures can be marked and affixed permanently to the mailpieces.
  • the mailpiece items are identified and verified by using a light of appropriate wavelength to illuminate the symbol on the items.
  • the illuminated symbol is captured by the camera 29.
  • the captured image is then transferred to the portable PC 22 where the data is enhanced (if necessary), compressed, and transmitted via a modem 26, cellular link, or satellite communication to the host computer 14.
  • the captured image can be decoded into clear text using the PC 22 and displayed at the site of the field reader system 18 for visual analysis.
  • fixed readers can be used during mail sorting operations to detect postal fraud and the like.
  • the control computer 12 and the host computer 14 receive the data from the field reader, and interfaces with the encryption unit 15 where the message is decoded and converted to clear text.
  • Either the total image or an ASCII string representing the image can be transmitted from the field reader 18 to the host computer or to the control computer.
  • the control computer searches the database to validate the indicia mark and any other postal service specific information.
  • the host computer reads and validates any customer specific information. Once validated, both the control and the host computers send messages back to the field reader 18 which displays the decoded message and any other pertinent information pertaining to this specific indicia, i.e., place, time of marking, or destination. If the marked mailpiece is counterfeit or has been received at the wrong point of final distribution, an invalid signal is transmitted and displayed on the field reader computer screen at the PC 22.
  • the indicia symbol can be decoded at the field reader system 18 and, at the option of the user, all pertinent goods or product data such as plant of manufacture, style, lot number, destination and the like can be displayed on the field reader computer screen at the PD 22.
  • the control computer 12 provides an allotment of marks to the host computer 14. This communication is carried out via corresponding enigma cards. The enigma cards will be discussed in detail below.
  • the host computer Once the host computer has received an allotment of marks, or an allotment of postage, or the like, it enables the marking systems to imprint indicia marks on the mailpieces as specified.
  • the host computer is limited in its ability to enable the indicia marking systems to impart marks to the extent that the control computer 12 has provided to the host the requisite number of marks, or postal fee, to cover the directions sent to the marking systems.
  • the host computer interfaces with the encryption unit to generate a data matrix symbology which represents specified information that the postal service and the customer selects to be represented by the indicia mark or symbol.
  • selected specific information which represents the mark or symbol
  • An ID string such as a five alpha ID string
  • the "start" and "end” counts are sent via a modem 24 to indicia printing system 16 where it is encrypted by the software of the marker CPU 27 and is printed onto mailpieces at this remote marking location.
  • This matrix is downloaded to the selected indicia marking system for use by the marker 20 in marking the mailpieces.
  • the mailpieces can be scanned by a field reader 18 to determine the presence of authentic marks.
  • the control and host computers compare the scanned mark with marks entered in their databases to determine the authenticity of the mark or to track the items.
  • the scanned mark can also be decoded into clear text by the reader system 18 and displayed on the screen (not shown) of the computer 22.
  • the host can also download an ID string to the CPU controlling the marker.
  • the PC then uses software to convert the ID string into symbols which are then printed; that is, ABCDE 00001 is converted to a matrix at the printer.
  • the foregoing discussion has been directed to the invention embodied as a postal indicia marking and tracking system.
  • Other embodiments of the system for anti-counterfeiting and anti-diversion systems are also possible.
  • An added feature of the present invention is the real-time nature of validation in any embodiment. Piracy, counterfeiting, and/or diversion commonly occur at the plant or just beyond its gates.
  • the present system allows the functionality of immediate interception on the yard, or the backdoor of the plant.
  • a field reader may be used for inspection at the plant gate to verify that goods going out of the plant gates are authentic, marked, and correctly routed.
  • a field reader or point of distribution and sale reader may be used to "instantly" authenticate a package module, mailpieces, invoices, or any marked article at the time of receipt, sale or processing. It should be understood, however, that this can only authenticate the printed document, and can not authenticate any signature affixed thereto which may or may not be forged.
  • the creation and marking of marks is real-time.
  • the marker PC at the site reports back to the host computer and therefore all the markings that have been prepared for the day's operation will be in the archives or in the records of the host computer 14. Immediately after the goods are marked, they can be inspected and a reading determines the (in)validity of the mark through the host computer 14.
  • the only lag time is that which is required to transmit from a field or point of sale reader to the host then back to the field reader to obtain validation.
  • the field reader remains connected while the host computer decodes and checks the data host for the scanned mark.
  • the reader receives validation while the goods are under the custody and control of the reader operator.
  • control computer 12 enables the host by providing an allotment of marks or fees, and tracks the number of marks allotted to the host computer.
  • the host computer allots a prescribed number of marks to the marker and thereby enables the marker to affix marks on the goods or materials.
  • the host tracks the activity of the markers and counts the marks made at the marking locations.
  • the present invention ensures that authentic goods are routed to the correct destination. Items diverted, and counterfeits lacking the identifying marks, are located. In the case of many products or goods like handbags, trading cards, works of art, or any other article where authenticity adds to the value of the item, the system can be used to guarantee authenticity. Authenticated routing also adds to the value of mailpieces, insuring that merchandise contained within is not counterfeit. A certificate of authenticity can be provided at the final point of distribution.
  • the system and method of the present invention is also particularly well tailored for use by customs agencies and clearing houses around the world for quick and easy inspection of goods entering a country, thus facilitating detection of counterfeit and misdirected articles.
  • information may include information relating to the domestic representative in a foreign destination for the goods.
  • the central or control computer 12 communicates with the host computer 14 to provide the host computer with an allotment of imprints.
  • the enigma card enables a secure communication to be established between the control computer and the host computer and between the host computer and the marker which is, for purposes of discussion, a printer.
  • the central or control computer 12 can access the host's network to re-enable the host computer 14 with another allocation of imprints.
  • the whole system shuts down.
  • the host must then call the central computer and be re-enabled through the acquisition of an additional allotment of imprints.
  • the host computer 14 can access each printer under its control to re-enable the printer with another allocation of imprints.
  • the printer expends its allotment of imprints, the whole system shuts down.
  • the printer must then be re-enabled through the acquisition of an additional allotment of imprints from the host.
  • unauthorized cases of cigarettes, destined as contraband can not be marked once the authorized printing allotment has been completed. Any additional allotment must be authorized by selected personnel.
  • the enigma card has its own microcontroller, random access memory (RAM), and storage capability. It, also has its own program so when the host establishes a connection with the printer location, the host is actually communicating directly through the enigma card.
  • the enigma is constructed to be tamper proof.
  • the enigma card microcontroller is programmed to manage its own on-board memory. Any writing to the memory is managed by the on-board microcontroller and that on-board microcontroller talks to the PC and the PC talks to the host through the modem.
  • the enigma card has an on-board security bit that can be set to protect internally programmed software codes and security codes. It is commercially available, having custom software codes and security codes that are not readily readable.
  • the host actually has the same enigma card as the printers located at the manufacturing site.
  • the computer at the printer location may have limited software that limits its ability to use the enigma card.
  • the first step is to establish a coded communication.
  • the printer location enigma card continually monitors either every print or some block of marks created and imprinted at the printer location.
  • the printer location enigma card tracks the number of marks against the allotment from the host computer 14.
  • the printer location enigma card immediately prevents additional marking. The printer can no longer operate without authorization from the host computer enigma card to the printer location enigma card.
  • Marking information at the end of a manufacturing run, or alternately a mailpiece marking run, is transmitted to the host computer 14 via the respective enigma cards before the line is disconnected.
  • This information may include the quality of marking by the printer and the quantity allocated but unused by the printer.
  • the host computer 14 can also interrogate a printer and gather this information. This can be done on a random or a spot check basis.
  • the control computer 12 periodically updates its own database to reflect the number of imprints allowed by the host computer 14 and marked by the marking system.
  • the control computer 12 is controlled by the postal service and can be located at postal service headquarters or at the vendor facility, or both.
  • the control computer serves an internal audit function which tracks the uses of various host computer systems.
  • the control computer downloads an allotment of imprints to the respective host computers. These imprints are then held in the memory of the host computer 14.
  • the host can only enable marking systems to mark the number of marks allotted to its bank. Once this allotment has been depleted, the host computer 14 must once again be enabled by the central or control computer 12 through a replenishment of its internal bank of marks or other allotments.
  • the host computer 14 controls the marking process by enabling the marker CPU 27 at the marking location and determining the number of imprints which will be used by the marking system for a particular lot, order, final destination, day, week, month, etc. For postal indicia marking, postage fee is printed. The host dictates to the marking PC the number of available prints/marks for a particular run. The host controls the manufacturing plant by allocating and tracking the number of goods which will be printed. The allocation and tracking information is, however, established by the control computer 12 and downloaded to the host computer 14. Optionally, the controller at the marking location will not know what symbol is being printed nor what code is being printed that day. The marker controller has no way of changing the code that is supplied to it by the host computer 14. In addition, the controller may be prevented from reading the code as supplied to it by the host computer 14.
  • the system is able to allow the host computer 14 to change the code at any time, even during a marking run.
  • the host computer 14 can also interrupt a cycle at any time and change the code. Alternately, such a changes may be made at the control computer 12 level for added security. If the host controller believes that the code has been compromised in some fashion, the code can be changed entirely and the operator at the print location need not be notified of the change. Code changes may be implemented after allotment to the remote marker location when warning flags indicate that the security systems, including the enigma cards, have been compromised or may be done on a random basis. This is possible because the two computers are in communication during the marking run, and the marker operator is unaware of the symbology being printed.
  • the code is preferably changed on a random basis.
  • the input data, encoded entries, and marks are kept as a confidential collection of data within the control computer 12. Using this approach, specific information can be logged which facilitates tracking the flow of goods and possible identification of counterfeit goods or items, i.e., goods or items not marked or not marked properly.
  • the encryption method is encoded on a microcontroller, using, preferably, a table encryption method.
  • the marker location requires that its enigma card, which is actually a PSD in the preferred embodiment, establish a coded communication with the host computer. Once the communication has been established between the enigma cards, then various program files are executed. The host computer 14 then determines how many marks have been used by the marker, enables more marks if needed, removes marks if required, and enables marking for a specified time period.
  • the PSD plays a role in providing a starting and an ending accounting number. Any communication with the marker is in a coded format which requires the PSD to instruct the marker how to make these marks and how many to make.
  • a digit code is downloaded to the marker location after the security protocol is established between the host computer and the marker location on the computer security device. As soon as verification that a secure transmission link has been established, a coded transmission is then exchanged from the host to the remote marker location.
  • the conversion of the identifying information into the matrix is accomplished through the use of a computer program.
  • I.D. Matrix located in Clear Water, Fla. provides a patented system for encrypting information and enabling conversion of an alpha/numeric code into the symbology format of the present invention.
  • the present invention can use other symbologies such as PDF417, 1-D bar codes and the like.
  • the chosen symbology is only a means for accomplishing host data base authentication, encrypted data transmission, enigma card control and electronic audit capability made possible with the disclosed system.
  • the host computer 14 downloads the matrix symbology digitally across a modem, the Internet, or other communication means to the remote marker location.
  • a pictorial representation of this encrypted message comes up on the computer screen at the host computer 14 for verification and appears as a checkerboard of black and white squares.
  • the matrix symbology is downloaded to any remote marker location via the enigma cards.
  • a proprietary system loaded on each enigma card scrambles the digital data to prevent interception of this message.
  • An encryption card is loaded in the host computer's enigma card and a matching encryption card is loaded in the enigma card located at the remote marker location.
  • the transmitted message is then reassembled at the marker location through the encryption chip at the marker location.
  • the marker location computer is able to serialize the marks (i.e., 00001, 00002, etc.).
  • This numbering system is an inventory control system as well as a security system because the host computer allocates a number of imprints to the marking system for a particular lot, order, destination, day, week, month, etc.
  • the first item such as a mailpiece with a first postal fee
  • These might include mailpiece or product identification, final point of distribution, delivery lot number and the like.
  • Each character e.g., ID string
  • This serialized marking with selected customer specific data (unique count, plant, destination, date, lot or order) data is printed in the I.D. Matrix format. It should be understood that a particular marking is not limited to the illustrated ten alpha/numeric characters, but can comprise fifty or more characters.
  • the number of alpha/numeric characters used in the markings is limited only by possible size restrictions placed of the matrix symbol mark imprinted on the goods.
  • the marking information is sent back to the host computer 14 with the total inventory number once the manufacturing run has been completed or as the host directs the marker location.
  • the security code is a ten character code comprised of five alphabetic and five numeric characters.
  • the marker location computer can request an allotment from the host computer 14, which number is either automatically allocated by the host computer or is specifically requested from the marker location. As added security, the allotment number is verified by the control computer 12. At this point, the marker location is not generating the code, but merely requesting authorization from the host computer 14.
  • the host computer allocates to the marker a quantity of marks. Depending on the degree of control that the host computer requires, it can allocate for one day, one shift, one week, one month, or a whole year. The host-to-marker allocation method is thereby flexible enough to adapt to the needs of the particular type, of manufacturing operation.
  • the host computer 14 maintains a record of the number of marks used by a particular marking system. Recalling that a plurality of host computers are usually employed, the control computer 12 preferably records the number of marks used by each host computer 14. This accounting occurs through the PSD. The enigma card protects and controls how many copies are made and how many marks are made.
  • the marking system updates the host computer 14 on a periodic basis with respect to the number of marks used during a specified cycle or run. This transfer of information can be programmed to occur on a random basis or at selected predetermined intervals. For example, if the marker is allotted 5000 imprints, but only 4,337 are used at the end of the day, the marker location computer will report back to the host computer that only 4,337 imprints were made.
  • the system thereby, functions as an inventory control, audit system as well as a security system. This is particularly useful in the context of system licensees. This feature facilitates license agreements on a batch unit basis and keeps strict control over licensees for royalty purposes.
  • the mark, pattern, or symbol which is applied to the material can be as simple as a logo or brand identifier, but in the preferred form of the present disclosure, the mark, pattern, or symbol includes the encoded data and is typically requested in a symbology format such as the I.D. Matrix format.
  • the data can be quite substantial, including such information as the lot number, a manufacturer identification number, the particular market destination (i.e., the country or state), a product identifier, a company identifier, and time, date, and place of manufacture.
  • the mark can also include data representative of the particular plant in which the goods are manufactured and packaged, and any other information which is represented alphabetically, alphanumerically, graphically, or the like and can be associated with the mailpieces.
  • marks for products include final point of sale
  • associated financial documents can include account number, sequential identifying numbers, and the like. All such information, i.e., input data, encoded entries, and the marks, are stored in mass storage devices for later use in goods verification/authentication, tracking, and/or counterfeit detection.
  • the mark applied to the packaging material can contain this information along with a goods identifier, destination and manufacturer identifier.
  • the mark can include chemical agents that are not visible until they are exposed to certain frequencies or wavelengths of visible or non-visible light which render them readable.
  • Such chemical agents can include ultraviolet (UV) or infrared (IR) sensitive dyes.
  • the symbology is printed using invisible ink so that the operator will have no way of knowing whether a valid symbol has been printed. More specifically IR activated inks are preferred to mark certain items in that identifying symbols can be overprinted on visible trade markings leaving the packaging of the product visibly unaltered to the naked eye. The identifying symbols can subsequently be read, using appropriate light sources and cameras, without interference from the visible trade markings. A reader, however, is located down the line and scans the marked articles, illuminates the mark and verifies the data matrix indicating that it is indeed a readable mark. The hardware and the software on the ground at the marker determine the number of valid marks imprinted on a particular run of goods.
  • the marks and symbols are comprised of encoded information represented by an alpha/numeric code.
  • a ten character alpha/numeric code is entered at the host computer 14. Five characters would be alpha and five characters would be numerical, i.e., ABCDE 00001.
  • the marking system could be reversed so that the numerical side may be used for the purpose of providing such information as plant, lot number, customer number, account number, document number, etc., while the alpha symbols may reflect a sequential accounting.
  • the code is selected and entered, it is encrypted into the form of a data matrix which resembles a crossword puzzle or a checker board. Selected encoded information is distributed at random within this matrix.
  • the symbology will consist of nothing more than black and white squares once exposed to UV or IR light.
  • ABCDE 00001 is converted into a distinctive checker board data matrix symbology. As items are imprinted, the code changes. Using the example from above, the number increases to ABCDE 00002 and a second unique checker board data matrix symbology is created and imprinted on the second item. The second symbol does not resemble the first one, other than the fact that it consists of black and white squares.
  • the marking operation can be either operator initiated or clock initiated.
  • the marker itself has a computer in it and is controlled by the enigma card and the modem link. In response to the enigma card and modem link, the marker location computer controls the print heads that actually print this I.D. matrix.
  • the marker also has the software to generate the I.D. matrix from the data provided by the host.
  • a suitable transporting system i.e. a conveyor, moves the mailpieces, package modules, or the goods themselves, underneath the print heads at a predetermined speed so that the print heads can imprint the encrypted code that has been established at the host computer on the fabric or goods.
  • the print machine comprises a closed loop system that monitors the imprinted material as it comes through the line.
  • a detector examines the imprints and detects whether a valid imprint has been made. The detection step is performed using a camera. If a marking error occurs for whatever reason, e.g., the ink runs out or a misprint occurs, a signal or a beacon may be activated to allow the local operator to make a command decision as to whether to continue to print, continue his production without marking, or to stop the process and troubleshoot the problem.
  • the software package counts valid marks and stores this number for transmission to the host computer 14. Ultimately, these valid marks are debited from the host computer bank.
  • the on-line verification reader is typically located six to eight inches down the manufacturing line from the marker. The verification reader reports to the marker location computer, which reports to the host computer 14 at the end of the day or other specified period. If misreads or mismarks occur or the full allocation for the day is not exhausted, the host computer is informed at the end of the day or other period.
  • the system can be used to read random marks, decode, convert to ASCII string, transmit to host, assign that ASCII mark to a specific shipment, postal permit, PO number, destination, pack, carton, case and the like.
  • ASCII mark it might be desirable to mark material early in the manufacture cycle, and trace or read the products at various states of the process until the product is completely finished. In this application, care must be taken in the method used to affix the mark.
  • the manufacture of a pair of "washed" jeans is to be traced by initially marking the cloth used in the process, and then reading the mark throughout the manufacture process which a washing step. Further assume that the identifying marks are printed on the cloth.
  • the ink used must be selected to withstand each manufacturing step, and in particular, selected to withstand the washing step. It has been found that suitable inks are available. Waterproof inks can also be used so goods can be marked at any point of production. More specifically, inks are available that can survive more than fifty commercial washings and have been used to mark rental uniforms for tracking.
  • the print location controller enters a user I.D. and input data detailing destination, shipping instructions, etc. to the host computer through the enigma cards.
  • the confirmed request or order is transmitted to the marker location computer in encrypted code format by the host PC.
  • the present authenticating system has the advantage that permanent marks are not required, i.e., the marking formulations can be water soluble or soluble in a variety of organic solvents.
  • the general chemical family is classified as derivatives of stilbene fluorescent compounds with emissions in the range of 450 NM when exposed to UV radiation.
  • the present disclosure sets forth a system in which temporary markings are placed on the goods.
  • the compounds exhibit at least some permanence when used on some products, i.e., leather.
  • the marks, symbols, or patterns used in the present invention can also be made permanent through the use of permanent chemical agents. Permanent markings can be especially useful with goods that are not typically washed or with goods where accurate product tracking data is highly desirable.
  • handbags are typically not washed and may have a life in the possession of a consumer of several years. Thus, it may be important to know the source of those handbags even years after the original sale to investigate after market information or product demographics. Even when a handbag is several years old, it can be checked using the present invention to determine the manufacturing lot number and other data contained in symbols which were placed on the handbag during manufacture.
  • the marks, symbols, or patterns suitable for use in the present invention can include, without limitation, codes such as UPC symbols, data matrix symbols, graphic symbols such as logos, pictures, images, and the like, encrypted data in textual, numeric, binary, octal, hexadecimal, alphanumeric, or the like, or any other data encoding format.
  • the item is marked in a suitable pattern as shown in FIG. 2.
  • FIG. 2 shows a segment of a mailpiece, such as a 9 inch ⁇ 12 inch mailing envelope.
  • the dotted lines at 32 and 34 represent guidelines within which the indicia markings are placed. It is well known in advance where the marking guidelines 32 and 34 will be located with respect to the overall dimension of the envelope. For instance, they can be located at the upper right hand corner of the envelope.
  • the markings are preferably located so that the two guidelines 32 and 34 assure that the repetitive marking process locates the symbols at the desired location on mailpieces such as the mailing envelopes in the example. Alternately, only one mark can be applied, or more than two marks can be applied to facilitate the scanning process, especially at the final point of distribution.
  • two sets of indicia markings can be applied to an item through the use of two duplicate ink jet printers. Indeed, four or five duplicate ink jet printers can be used in parallel to provide even more markings on an item.
  • each head can be programmed to print the same matrix at a different physical location, or each head can be programmed to print different serialized matrices.
  • one nozzle can be used to print clear text data such as ABCDE00001, and the other nozzle can be used to print the equivalent encoded matrix.
  • the markings are preferably applied repetitively at the same physical location of each marked article.
  • FIGS. 3, 3a, and 3b of the drawings represent representative symbols which are shown in FIGS. 3, 3a, and 3b of the drawings.
  • the symbols encode a set of data which enables unique identification of a lot of goods and date of manufacture of these goods.
  • the set of symbols shown are particularly useful because the location of certain portions of the encoded data is not specifically known. For instance, protection against counterfeiting of the numbers for purposes of printing authentic, but unauthorized indicia marks can be implemented.
  • every symbol in the data indicated by the numeral 56 shown in FIG. 3b
  • symbols in the region at 58 can have significance when decoded. This can be used to enhance the security of the encoded symbol on the bulk cloth.
  • An alternate embodiment is the bar code which is used for UPC identification. While that particular code need not be used, it is acceptable in terms of format.
  • the chemical formulation can be an ink or similar composition that can be applied in a predetermined pattern to the modules or, alternately, to the packaged goods. As applied, it is formed into a specific pattern representing either encoded data or raw data. The pattern can be in accordance with the UPC symbols or the like.
  • the ink jet printer applies identifying marks using a dye along with a volatile solvent which evaporates, leaving the markings on the marked item.
  • the ink used is a proprietary product of Trident, Inc., Bloomfield, Conn. identified as FL-61.
  • the markings are of the sort which are not readily visible to the eye, but are readily seen or detected upon exposure to non-visible light sources such as on exposure to UV or IR light which causes the mark to become illuminated or visible to the eye. Of course, the exposure need not make the mark visible to the eye. All that is required is that the mark become detectable in some fashion so that the system can discern the mark, decipher or decode the mark and verify the authenticity of the mark. If desired, a permanent dye can be used.
  • the anti-contraband, anti-counterfeiting, and tracking system aspects of the present invention contemplates marking mailpieces, raw materials, intermediate products, products, or package modules of products with a symbol or pattern which conveys authenticating information, storing this information in machine readable format in a computer database, and using a field reader to identify authentic, or counterfeit, or contraband package modules or goods.
  • the indicia marking aspect of the system of FIG. 1a includes a remote modem 24 (see FIG. 1b) which communicates with a host computer 14 and a marker for imparting the patterns or symbols on the goods or mailpieces or, alternately, on one or more fixtures affixed to mailpieces or other items or products.
  • a remote modem 24 see FIG. 1b
  • the system of FIG. 1a can be used to mark mailpieces comprising paper, cardboard, leather or plastic, e.g., cellophane, waterproof sheet plastic, woven nylon cloth, etc.
  • items being marked can be package module mailpieces.
  • the system/host computer protocol operates as follows.
  • the marker system 16 waits for the host computer 14 to call and download ID string (ABCDE) and the start/stop print sequence codes for the specific print cycle.
  • ABSDE download ID string
  • the marker system 16 is a printing system and that the marker 20 is a printer.
  • Print data is stored in memory on the enigma card.
  • the ink jet printer head 44 is positioned at the requisite location to direct an ink jet onto the package module.
  • the ink jet printer head 44 preferably applies an ink which is formed of two components, a dye and a solvent or carrier.
  • the solvent is volatile and evaporates so that the dye is left on the marked package module.
  • the preferred dye is one which is not visible when impregnated into the surface of the marked item.
  • no marking is seen in ordinary light by the unaided eye. Rather, the marking is visible when irradiated with a special wavelength of light as described.
  • the marking system 16 calls the host computer 14 to upload the total print count for that cycle.
  • the marking system 16 is comprised of an enclosed single 256/32 channel print head mounted at 90° to the path of the product or Dual 96 orifice/32 channel print head mounted at 27 degrees to the path of the product.
  • the print heads are mounted on a swivel bracket assembly with a detent home position.
  • the print heads are controlled by the print location computer, which accepts data for generating printed images from the host computer 14 via modem.
  • the print location computer will typically be a personal computer.
  • the data can be ASCII or graphic images.
  • the print head(s) alignment is suitable for applications needing 64 bits of vertical resolution.
  • the software is designed to print graphics images that are 64 dots vertical and 16 dots horizontal. By utilizing the printer bolderization parameters, the horizontal resolution can be extended to any integer multiple from 1 to 10.
  • the package modules which are box mailpieces in the example being discussed, are positioned for marking on a conveyor station as shown in FIGS. 4a-4c.
  • the conveyor station package module carrier pads 40 (shown in detail in FIG. 5) in front of an operator 42 who positions the "to-be-marked" section of mailpiece modules to be marked 43 on each pad 40 as the appropriate section passes by the operator 42.
  • the to-be-marked section is smoothed and held by air-suction provided by engaging a carrier suction actuator 45 through the vacuum ports 47 on the pads 40 while it is being transported from the operator 42 to and under an ink-jet printer head 44 and optical print verification detector 46. The suction is then removed, and the marked package module is released.
  • a narrow electric-motor driven belt with multiple carrier pads 40 attached at spaced intervals circulates around an elongated oval track powered by a transport drive 48.
  • ten carrier pads 40 are spaced at eighteen inch intervals.
  • a straight section of the track in front of the operator 42 exposes the pads 40 for loading and connects the pads 40 to a vacuum system that provides the suction. At the far end of the straight track, beyond the print-head location, the vacuum connection is broken and the belt and pads curve around a drive-pulley under protective cover to begin their return to the loading operator 42.
  • a horizontal motor-driven conveyor belt 50 parallels the straight section of track along a line just below the carrier pad 40 to support and move mailpiece modules while their to-be-marked sections are on the carrier pads 40.
  • the speed of the carrier pads 40 and the conveyor belt are perfectly synchronized so that the to-be-marked sections remain fixed on the pads until ink marking and checking are complete.
  • the synchronized speeds are infinitely programmable over a range depending upon the complexity of the package module being marked and operator skills.
  • the items can enter the mail system 402 (see FIG. 1a). Subsequently, mailpieces can be inspected at remote locations to determine whether the mailpieces are authentic, i.e. whether the goods have an authentic indicia marks which can be confirmed. In addition, specific information provided by the mark aids in the tracking of the mailpieces through the mail system 402.
  • the marker operator may provide the host computer 14 with detailed shipping information so that the host computer can modify the code to include this information.
  • the marker controller may have the functionality to provide information to the host computer or the host computer controller may enter this information so that the information would be associated with the marks or symbols imprinted on the mailpieces destined for a particular region. Alternately, postal rate or fee information may be supplied by the control computer 12, and downloaded to the host computer 14.
  • the only information that the print controller will have at its disposal is a warning, i.e., low ink, low temperature on the print head, high temperature on the print head or some sort of malfunction and a screen which instructs him on how to troubleshoot the problem. If an emergency shutdown of the line occurs, a system lockout results and a supervisor must insert a key to restart the whole system again. This serves as a physical security measure.
  • the host computer 14 or marker can be informed of a run change so that the symbology can also be changed. This can be done on a real-time basis, and implemented by commands from the control computer 12 or the operators of the host computer.
  • the marker location computer will also interface with an optical reader 46 to verify product marking.
  • the optical reader scans the marked products and cross references the scanned information with the encoded data. This procedure insures that the imprinted marks or symbols are properly placed on the goods package module and allows confirmation that the appropriate marks or symbols were placed on the appropriate goods or materials.
  • the system can also randomly preprint products being combined for shipment to a specific customer, PO, destination, etc.
  • the mailpiece package module After the mailpiece package module has received its indicia marking from the marker, the module is scanned by a reader to confirm a valid marking. A camera is positioned to verify that a readable print has been made and that the information conveying positions of the symbols are readable.
  • the camera is preferably a charge couple device (CCD) camera. It is a black and white television camera with a solid state image center. However, any detection means capable of capturing the image is envisioned by the present disclosure.
  • CCD charge couple device
  • the CCD camera illuminates the mark with UV or IR light and the CCD camera will capture the UV or IR illuminated image.
  • the captured information will be fed to the computer which will verify that the expected print actually was printed. Either a match is obtained or not. If no match is obtained, the marker computer indicates a problem with the marker to the marker controller and to the host computer.
  • the marker is a printer, a plugged nozzle in the print head can affect print quality adversely and prevent the field reader from capturing the image so that it can subsequently be decoded. This cross referencing system allows early detection of marking problems before too many marks are printed that are unreadable.
  • the indicia marking system operates generally as follows.
  • An I.D. matrix is generated.
  • the marker PC instructs the print head to print the matrix.
  • the matrix will be saved and compared to the captured and processed image from the CCD camera and which compares the scanned mark with the mark generated by and stored in the database to determine the existence of a match. If a match is not made, a bad mark reading signal is received at the marker PC. In this manner, the marker operator is informed of a potential problem.
  • the validation occurs through the marker location computer.
  • the matrix originates as a result of communication between the host computer 14 and marker location enigma cards, but, once created, the matrix itself is stored in the marker location computer. Marks can be debited or accounted for after verification if so desired.
  • the fourth component of the system is the field reader.
  • the field reader is preferably a hand held device housed in a briefcase or the like.
  • the briefcase typically comprises a power pack battery source, a laptop computer, and a hand held reader that is connected to the laptop computer.
  • the field reader can be a table top device connected to 110 volt AC "house" power.
  • FIG. 6 shows a side view of a hand held reader.
  • the hand held reader 90 has a handle 92, a CCD camera 94, a light source 96, an electronics module 98, a narrow band-pass filter 101, and a cord 100 for connection to the central processing unit.
  • FIG. 7 shows the circular configuration of the light source 96.
  • the means for detecting or reading the activated indicia mark can be a bar graph reader such as is used to read the universal product code symbols (UPC hereinafter) in the case where the mark is a bar graph or any other type of reader used in conjunction with other arbitrary marks, symbols, or patterns.
  • a data block can be printed on the goods or modules used to package the goods, such as a mailpiece carton, where the data block includes light and dark areas (treated and untreated areas) in a given arrangement that can be read and converted into an encoded data entry or raw input data.
  • the encoded marks are read by illumination with the required IR or UV source. If the indicia mark is overprinted onto an existing visible mark such as a trademark or a logo on a mailing container, symbols printed in IR activated ink, and illuminated with one or more IR light sources, are preferred. Once obtained, the symbols are compared by manually comparing the marks or by using an optical scanner connected to a computer whereon there is a database containing the various range of entries. Such a database will commonly be stored in a table structure utilizing commonly available database software. This database of values, commonly seen in a "look up" table, provides the appropriate codes marked onto the product.
  • the data base can be arranged to cross-reference and cross-validate various arrays of information that have been encoded.
  • the database in the form of a look up table, can conveniently provide data indicative of origin. Should the markings be counterfeited, there is no basis by which the counterfeit indicia mark manufacturer will know the appropriate origin and destination data, thereby increasing the possibilities of detecting mailpieces marked with counterfeit indicia.
  • the CCD camera 94 captures the image and extracts the matrix out of that image so that it can be stored in memory along with other information provided to the field reader 18, such as the location of inspection, etc.
  • the reader has the capability to decode the matrix. In one embodiment, this function is disabled to prevent any compromise of the security of the overall system.
  • the reader merely captures the I.D. matrix and transmits the image back to the host computer 14. Then, either on-line or at a later time, the field reader 18 calls up the host 14 and downloads the series of ones and zeros.
  • the host computer 14 has the ability to decode the I.D. matrix and determine if a valid or invalid code is present.
  • the host can utilize all the encoded information to inform the inspector concerning tracking/diverting problems.
  • the reader 18 decodes the image and transmits an ASCII string representing the image back to the host 14 for authentication, rather than transmitting the total image.
  • the goods Upon inspection at various locations, e.g., postal inspection stations, the goods are scanned for a representative mark or symbol. Either confirmation of marking or confirmation of specific data can be determined. This may require modem 26 (see FIG. 1b) connection between the local reading terminal 22 and the host computer 14 where the encoded information is secured and stored. Comparison of the mark or symbol with the stored data enables both detection and tracking of authentic goods, as well as detection of counterfeit goods lacking the necessary mark or symbol of authenticity.
  • the host computer 14 utilized in the encoding/decoding system consists of a personal computer with serial and parallel interface, VGA monitor, keyboard, an Intel Pentium processor, a 400 meg HDD, 3.5' FDD, and 9600 baud modem.
  • the host computer 14 is interfaced with an encoder/decoder which generates or decodes matrix codes for downloading to the marking system 16.
  • the host computer 14 accepts data from field readers and interfaces with the encoder/decoder to authenticate the captured matrix and then returns a valid/invalid signal to the field reader.
  • the host computer 14 can alternately receive the image from the field reader 18 as an ASCII string.
  • the host computer 14 maintains a non-volatile record of serialized encoded messages downloaded to each marking system location, maintains production run data for each remote marking system, and maintains a database for the field reading system to aid in product tracking and authentication.
  • the host computer communicates with field readers via ASCII 7 bits, 1 odd parity bit, 1 stop bit and 1 start bit. This communication allows the field readers to provide data to the host computer which can be processed, thus enabling detection of authentic and counterfeit goods.
  • the markings are made visible by irradiating light from a special lamp.
  • the lamp provides a selected wavelength of light which illuminates the mark or symbol.
  • UV and IR light may be used to illuminate printed marks utilizing UV and IR sensitive dyes as described above.
  • An ink is selected which is compatible with a selected wavelength of light.
  • the preferred light is IR which illuminates IR responsive dye.
  • the preferred light form is UV light which collaborates with a UV responsive dye. When irradiated, the markings are then visible to a reader.
  • the field reading system 18 is used to verify valid indicia marking at any point in the mail distribution chain from the marker to delivery.
  • the portable reader consists of a video or digital camera system with selected light sources for image acquisition (i.e., IR, UV and white light), a personal computer controller and software to capture, store, and enhance the quality of the image, and a modem for communicating with the host computer.
  • the host computer/field reader communication protocol is as follows.
  • the field reader transmits I ASCII, 7 data bits, 1 odd parity bit, 1 stop bit, and 1 start bit.
  • the field reader will also transmit an identification header (12 character text string), operator name (20 character text string), operator name (20 character text string), location, (20 character text string), and a digital image.
  • the digital image is a 256 ⁇ 256 8 bit scale image transmitted in raster pattern from upper left to lower right pixels of the image.
  • the host computer 14 accepts remote field reader data, interfaces with the encoder/decoder, and returns a valid/invalid message to the field reader.
  • the host computer 14 also provides the field reader with data listing all previous verifications of the encoded message in the form of monetary amount, route, date, time, location, operator, and valid/invalid status.
  • the inspecting agent can inspect different mailpiece mailpieces or goods produced under the control of one of a plurality of host computers 14.
  • their symbology is typically proprietary. A company would not, for instance, even with identical equipment, be able to read another company's code.
  • Each network has proprietary symbology developed specifically for that customer.
  • the invention can, however, be used by postal or other agents to scan distributed by numerous companies. In this application, inspectors use the reader system by capturing the indicia image and pressing a button to indicate a certain company. As a practical matter, inspection occurs through the use of private inspectors and with postal service personnel.
  • the customer may actually pays for a campaign, i.e., a cycle or a 3 to 6 month campaign, depending on how extensive an inspection and tracking of mailpieces it desires.
  • the invention places into the hands of the postal or other agents and/or paid customer field representatives a foolproof method of capturing the encoded images on mailpieces and other items, and verifying that the items are indeed legitimate or properly routed without expensive or extensive training.
  • An added advantage of this system is the implementation of a system that avoids all the paperwork that the postal or private personnel would ordinarily require in inspections and making inspections more readily accessible.
  • the system does not require that the inspection agent operating the reader system even focus the camera. All that is required is that the reader system be turned on.
  • the reader system is packaged in a briefcase and is typically comprised of a laptop computer, a battery pack and the hand held reader.
  • the hand held reader may be attached by an umbilical cord or may operate independently of an umbilical cord.
  • the reader may read a certain number of mailpieces, capture the information and subsequently be plugged into the laptop computer to download the information from the hand held reader to the laptop.
  • Radio frequency transmission from the hand held reader back to the laptop.
  • the information is captured and then downloaded.
  • the information typically is going from an analog to a digital signal and into the laptop computer.
  • An automatic dial up modem connects the laptop to the manufacturer's host computer.
  • the host searches its archives for the captured information.
  • the encryption unit decodes it and a signal is sent back to the laptop creating a display on the laptop screen which indicates whether the product is valid or invalid.
  • transmissions are in the form of ASCII strings as previously discussed, and not in the form of the much larger bitmap file.
  • information relating to previous inspection time, dates, and places can be placed on the screen. In other words, the goods can be traced anywhere along the distribution chain where those goods have been read or that shipment has been read and this information is archived in the host computer 14.
  • Each laptop or hand held reader is preprogrammed to recognize the user.
  • a user logs on, it identifies nomenclature chosen to establish communication with the appropriate computer.
  • the field inspector To gain access to the host computer 14 or to the control computer 12, the field inspector must properly identify himself. This may include a password in addition to his name. There will be a reader I.D. and an inspector I.D. The field inspector will be asked to enter his location, and then the time and date is automatically entered.
  • the laptop and the reader equipment can be purchased off the shelf.
  • the CCD camera is commercially available also, but the light source has been added to illuminate the marks.
  • the packaging of the components to make it user friendly is an aspect of the present invention.
  • the system also captures inspection and routing information. It actually tracks the actual routing through each inspection station or check point.
  • An audit trail is created through inspection that evidences what the field inspectors inspected and whether they check or merely spot check all of the mailpieces, goods or materials. When an invalid signal is received, this information can be stored.
  • the host computer will mark the code in the database indicating it was read on a particular date at a particular location. And if that item is read two or three places along the distribution chain, all that information will be in the host and will be downloaded to the laptop at the time that the mark is read. If counterfeit or diverted goods are identified, the field unit has the software that allows a manual input of bills of lading and purchase order data and/or the fact that it was obtained after inspection.
  • the system thereby enhances the quality of data gathered by the reader system.
  • This is one of the prime objectives of the present invention.
  • the field reader can be used to scan bills of lading and/or purchase orders so that such documentation can be associated with inspected mailpieces or goods.
  • a modem serves as the means for transmitting information from the field reader to the host computer and back to the field reader the previously disclosed embodiments. Also, in highly developed countries such as the U.S., transmission via cellular telephone is possible.
  • a satellite system is available that will allow the field reader to uplink to the satellite, down to a ground station, and back to the host. Whether it is the reader to the host or whether it is the marking system to the host, in terms of modems and phone lines, the Internet, satellite, private phone lines, private satellite systems, any commonly known method of transmitting data may be employed. Digital data will be transmitted by the most convenient method.

Abstract

A system and method for marking mailpieces for postal fee and tracking purposes is described. The system greatly increases security now obtainable with conventional postage meters and postage stamp affixation. A central control computer under the control of a postal service enables the system. Host computers under the control of customers and the postal service are used to control and audit the printing of indicia marks on mailpieces. Mailpieces can be scanned with remote field readers at any step in the mail distribution process, thereby providing information to the postal service and to the customers. Real time analysis of the scanned indicia marks is used to reduce problems associated with counterfeiting of mailpiece indicia and mailpiece diversion. Information security is provided so that proprietary information of the postal service and the users of the system is maintained at all times.

Description

This is a continuation-in-part application of U.S. Ser. No. 08/740,656 filed on Oct. 31, 1996, which is a continuation-in-part of U.S. Ser. No. 08/633,538 filed on Apr. 17, 1996, which is a continuation-in-part of U.S. Ser. No. 08/420,034 filed on Apr. 11, 1995 (now U.S. Pat. No. 5,592,561), which is a continuation-in-part of U.S. Ser. No. 08/227,662 filed on Apr. 14, 1994, now abandoned.
FIELD OF THE INVENTION
The present invention relates to an authenticating, anti-counterfeiting, and tracking system. More particularly, the present invention relates to a system for marking postage which is a substitute for a postage stamp or a prior art postage meter imprint as evidence of the fact that postage has been paid on mailpieces.
BACKGROUND OF THE INVENTION
In the commercial world, it is not uncommon for counterfeit goods to be manufactured, distributed, and sold in direct competition with authentic goods. Counterfeiting has reached epidemic proportions worldwide, especially in the area of consumer goods including goods made from fabric, plastic, leather, metal, or combinations thereof such as clothing, handbags and wallets, perfumes, and other consumer goods. Counterfeiting of financial documents such as bank drafts or "checks" is also widespread in that both the check document as well as the affixed signature can both be of questionable authenticity. Furthermore, counterfeiting and tampering has affected the postal service. Prior art postage metering devices are not secure means for providing evidence that postage has been paid on mailpieces. Likewise, counterfeit postage stamps can be used as a means for circumventing postage payment.
It is common for the counterfeit articles to be of high quality and closely resemble authentic articles. Indeed, counterfeit articles, such as postage stamps, can so closely resemble genuine goods that postal processors readily confuse the counterfeit articles with the authentic articles. Thus, there exists a need for a system and method which enable a user to avoid using postage stamps and instead encode mailpieces with authenticity data by affixing a mark or symbol, and to enable remote postage processing stations to check the marks or symbols, whether affixed to packages or letters or the like, for authenticity thereby indicating that proper postage has been paid. Furthermore, it is desirable that the mark or symbol contain other data such as data used in tracking the mail piece, the origin of the mailpiece, the date of marking, the weigh of the mailpiece, and the like. Heretofore, such a comprehensive system was not available.
Prior art postage meters also lack proper security. There are approximately 1.5 million postage meters in use in the united States alone, which collectively account for approximately $20 billion in postal revenue annually. These meters affix a mark to mailpieces, and are designed to tabulate and record the amount of postage fee disbursed. Such meters are made by several vendors, and are thought to provide inadequate security against fraudulent use to avoid postage payment by physical tampering. In addition, the affixed marks are counterfeited to avoid postage fee payment, and such counterfeit marks are very difficult to readily detect by postal processors. In summary, a secure postal metering system which requires input from the user, the vendor, and the postal service has heretofore not been available.
Certain known prior art systems suggest marking items with different patterns. However, such systems do not suggest a system that directs the marking of items with a selected mark and the detection and verification of the marks at remote locations. The patents described below represent the art in the area of marking and detecting articles.
U.S. Pat. No. 5,289,547, issued on Feb. 22, 1994, discloses a method for authenticating articles including incorporating into a carrier composition a mixture of at least two photochromic compounds that have different absorption maxima in the activated state and other different properties to form the authenticating display data on the article, subjecting the display data to various steps of the authenticating method, activation of all photochromic compounds, preferential bleaching of less than all of the photochromic compounds, and/or bleaching of all the photochromic compounds, and subsequent examination of the display data following the various activation and bleaching steps by verifying means to enable authentication.
U.S. Pat. No. 4,767,205, issued on Aug. 30, 1988, discloses an identification method and identification kit based upon making up groups of microsized particles normally visible to the naked eye with each particle in each group being of a selected uniform size, shape and color. Coded identification is established by transferring a population of particles from a selected number of the groups to the item to be identified and then confirming such identification by examining the marked item under high magnification with a light microscope.
U.S. Pat. No. 4,623,579, issued on Nov. 18, 1986, discloses a decorative composite article which may be longitudinally slit to form a yarn product which has a combined phosphorescent and fluorescent decorative appearance. The composite article includes paired outer layers of a thermoplastic resin between which is disposed a decorative layer comprising a composition including a colorant component having a phosphorescent colorant and a fluorescent colorant, and a resin binder material. The fluorescent colorant is present in an amount by weight that is up to an amount equal to that of the phosphorescent colorant. The present binder material may be selected from polyester, polyurethane and acrylic polymers and copolymers, with a mixture of butadiene-acrylonitrile rubber and polyurethane composition being preferred.
The composite article is prepared by coating two resin films with the composition, followed by contacting the films with each other on their coated surfaces and applying heat and pressure to bond them together to form the decorative composite article.
U.S. Pat. No. 3,942,154, issued on Mar. 2, 1976, discloses a method and apparatus for recognizing colored patterns. The method includes encoding the colors of individual picture elements in a fabric pattern by comparing the level of transmittance or reflectance of the picture element at pre-selected wavelengths with stored values representing a reference color to generate a multibit code indicative of the color of the picture element. A comparator used for this purpose incorporates an error either proportional to the wavelength or of constant value so that the output of the comparator will indicate identity with the stored value if the input value for the picture element is within a certain range of the stored value.
U.S. Pat. No. 3,839,637, issued on Oct. 1, 1974, discloses the impregnation of spaced courses of yarn in a fabric with a material which is not visible under daylight, but which is visible only when subjected to ultra-violet light, so as to provide guide lines for cutting, or measuring indicia to enable visual counting of the number of yards of cloth in a roll from the end thereof without the necessity of unrolling the bolt.
U.S. Pat. No. 3,701,165, issued on Oct. 31, 1972, discloses a method of marking garments with a substance detectable by magnetic detecting devices. When the magnetized substance on the garment part is detected in a process of making garments, subsequent garment making steps are actuated in response to the detection of the stitching.
U.S. Pat. No. 5,289,547, issued on Feb. 22, 1994, discloses a method of cutting a sheet with a tool controlled by a computer system and in accordance with a cutting program wherein an operator marks certain particularities directly on the sheet using a fluorescent marker, the sheet is exposed to ultraviolet light while being scanned by a camera, the marking being interpretable as constraints on cutting to be taken into account by the cutting program, and cutting occurs following the instructions interpreted from the encoded pattern.
U.S. Pat. No. 3,991,706, issued on Nov. 16, 1976, discloses an automatically controlled cutting machine having a support table on which limp sheet material is spread for cutting by means of a cutting tool and includes a marking apparatus to identify key points on pattern pieces cut from the sheet material. The cutting tool and the marking apparatus are mounted on a tool platform for movement to any desired location over the sheet material. The marking apparatus utilizes a needle which is suspended above the sheet material and a dye thread which is laced through an eyelet in the depending end of the needle. Each time a mark is to be generated, the needle plunges downwardly through the sheet material, and dye on the thread is rubbed onto the material at the point under consideration. An indexing mechanism operated with the reciprocating movement of the needle pulls a finite length of thread through the eyelet after each marking operation.
Thus, there remains a need for a system and method for controlling, enabling, and directing marking of items such as mailpieces and enabling detection/cross-validation of the marks so that the mailpieces are uniquely identified and tracked throughout the postal pickup, processing, distribution and delivery system. Still further, the marks should verify authenticity and that the proper postal fee has been paid. In addition, it is desirable that the mark also specify other information such as the origin and the final point or points of distribution of the mailpieces. Furthermore, the markings should be durable and preferably resistant to normal wear and abrasion encountered in the processing and distribution of mailpieces. Still further, the markings should be relatively difficult to remove and, if removed, should preferably render the mailpiece essentially undeliverable or in a condition which prevents distribution if tampered with.
SUMMARY OF THE INVENTION
The present invention provides an authenticating, tracking, and anti-counterfeiting indicia system which can track various goods. The system is directed toward marking, tracking, and postal fee collection of mailpieces, but can be used to authenticate and track a wide variety of goods and articles of manufacture. The system includes a control computer, one or more host computers which cooperate with the control computer, a marking system, and a field reader system, which are all compatible and can be physically linked via data transmission links. An identifiable mark is placed on the mailpieces, goods, products, packages of goods, or on materials out of which the goods are to be made, which enables subsequent inspection. The mailpieces, goods or materials can be field inspected with a field reader to verify proper fee payment, to determine the authenticity of the mark or the goods, or to track the distribution of the mailpieces, goods or articles, and to determine the final point of distribution of the marked items.
Attention will be directed to the system embodied as an information based indicia program (IBIP) for a postal service. The control computer is under control of the IBIP vendor and the postal service. The host computer is centrally located. Each participant in the IBIP, hereafter referred to as the "customer", possesses a host computer which, in turn, controls one or more indicia printers. Each host computer is isolated from the control computer by a postal security device preferably in the form of an enigma card. This prevents access by one customer to another customer's confidential information by routing through the control computer. Each indicia printer, under the control of the host computer, affixes a mark mailpieces. The mark is preferably a two dimensional encrypted matrix. The host computer and indicia printer therefore replaces the prior art postage meter, or replaces the manual affixation of postage stamps to mailpieces.
Once marked, mailpieces enter the postal processing and distribution system. At one or more point in the processing and distribution system, an on-site or "field" reader captures or "reads" the mark and decodes the mark to preferably an ASCII string. The field reader then transmits the ASCII string to the control computer and to the appropriate customer host computer, wherein the mark is compared with marks residing in a database in the control computer and compared with a lesser, customer specific database residing in the customer's host computer. An authenticating match, and authentication of other data contained in the mark such as the identifier of an authorized customer, may or may not be obtained from the comparison. Results of these comparisons are then transmitted back to the field reader and displayed preferably in clear text. This allows the postal processor to immediately identify counterfeit mailpiece indicia marks, or to identify the use of authentic indicia marks by unauthorized personnel, or identify the use of authorized indicia without proper fee payment, or to identify improperly distributed mailpieces, or to obtain additional information on the inspected mailpiece.
In another embodiment of the present invention, portions of the indicia can be printed with ink which is visible only in light outside of the visible range. This portion of the indicia might contain distribution information or the like which is needed by the postal service and the customer, but is otherwise confidential. Postal inspectors uses light outside the visible spectrum to briefly illuminate indicia marks on the mailpieces under inspection. Through the use of responsive chemical agents such as dyes, that on exposure to non-visible light undergo a chemical, physical, and/or chemical-physical transformation making the marks detectable, an inspector can quickly read that portion of the mark and ascertain the desired information. A unique indicia mark, symbol, or pattern encoding specific identification data can be tailored to meet the needs of a particular customer as well as the postal service. The mark contains specific information which is unique to the mailpiece, not readily observable in visible light and which can be rendered detectable and readable upon exposure to non-visible light. The pattern can be scanned or captured by a reader and deciphered into encoded data. The entry can then either be compared directly to a set of authentic entries on a database or decoded and the decoded data compared to a set of data on the centrally located host database. In comparing captured patterns with authentic patterns within a host database, the total pattern can be transmitted to the host, or alternately, the pattern image can be decoded by the field reader and transmitted as an ASCII string to the host for authentication. In still another embodiment, the symbol pattern is decoded by the field reader and identified with readable or "clear" text on a screen of the field reader. In this embodiment, authentication of the mark is not made at the host computer.
As outlined previously, the -system of the present invention is generally comprised of a control computer, and a plurality of host computers with one host computer generally being under the control of one customer. Preferably the control computer creates each indicium using data provided by the postal security device and the customer, supports communication with the vendor's infrastructure, provides customer interface, employs current postage rates, supports the use of standard mailing addresses, and maintains records regarding host system use. Each host computer stores the specific, selected information conveyed by the indicia mark which is "customer specific", and directs the indicia printer to imprint the mark on the mailpiece, and also receives and processes information from the reading system. Alternately, the indicia printer can imprint the mark on an item which is subsequently attached permanently to the mailpiece, such as a gummed paper indicia mark akin to current postage stamps. Each host computer is connected via modem and through a postal security device to coordinate, receive, and respond to commands sent and received from the control computer, one or more indicia printer terminals, and one or more reading terminal.
In operation, the control computer contacts a host computer through a postal security device enigma card and enables a specific amount of postage fee, preferably equal to a prepaid amount. The host computer establishes an appropriate identifying message, using clear text, such as the amount of "postage" to be imprinted as an indicium on a mailpiece based upon current postal rates, the weight of the piece, the destination of the piece, and the like. The host interfaces with an encryption unit which converts the clear text message into a two dimensional matrix symbol indicia. The host then downloads the digital symbol to the CPU controlling the indicia printer. The host preferably establishes marker start/stop serialized codes and specific times the indicia printer or printers can be in operation in order to discourage unauthorized usage. Once the indicia printing cycle begins, a CCD camera mounted downstream from the printer maintains a continuous validation step that an appropriate indicia is being printed onto the mailpiece. If the printed indicia is different from that provided by the CPU, an error signal is activated to alert the operator. The CCD camera can also be used to decode the imprinted two dimensional matrix and convert the decoded data into an ASCII string, which can then be stored in the host database. This is important when the piece is marked with an encrypted matrix which, as an example, may include postage rate and a destination code before an actual destination has been assigned to that destination code. At the conclusion of the printing cycle, the marker CPU uploads a print count, preferably indicating the cumulative postage fee disbursed during the cycle, to the host.
From this point forward, marked mailpieces can be identified and verified through the use of field readers. The indicia can be imprinted directly on the mailpiece or, alternately, can be imprinted on a fixture which is affixed to the mailpiece. Gummed paper labels are examples of such affixed fixtures. The mailpieces are identified and verified by using a light of appropriate wavelength to illuminate the indicia on the mailpiece. The illuminated indicia is captured by the camera. The captured image is then transferred to a portable PC where the data is enhanced if necessary, compressed, and transmitted via modem, cellular link, or satellite communication to the host computer and to the control computer. Alternately, the illuminated indicia can be decoded into an ASCII string at the portable PC which may be sufficient for identification, or the ASCII string can be transmitted back to the host for authentication rather than having to transmit the much larger, though compressed, bitmap file.
The control computer and appropriate host computer receives the data from the field reader, interfaces with the encryption unit where the message is decoded and converted to clear text. The control and host computers then search their databases to validate the indicia message and any customer specific information, respectively. Once validated, the control computer sends a message back to the field reader which displays the decoded message and any other pertinent information pertaining to this specific mailpiece. If the marked is counterfeit, or if the indicia mark is found to be authentic used without authorization (e.g. without paying the proper underlying postage fee), an invalid signal is transmitted and displayed on the field reader computer screen. Alternately, the symbol can be decoded within the field reader computer, and the decoded data can be displayed on the field reader computer screen. In this embodiment, no comparison is made in the control computer
As mentioned previously in order to further enhance security, all transmissions between the control computer, the host computers, the field readers, and preferably between the host and indicia printer CPU, are conducted through postal security device enigma cards placed in each host computer at the time of manufacture, and initialized when the IBIP is activated.
The control computer provides an allotment of postage to the host computer. This communication is carried out via corresponding postal security device enigma cards which are located in the respective host computers. Once each host computer has received an allotment of postage, it is able to enable indicia printer or printers to imprint indicia on the articles or mailpieces as specified. Each host computer is limited in its ability to enable the indicia printing systems to impart marks to the extent that the control computer has provided to the host the requisite number of postage to cover the directions sent to the marking systems. As an example, only a controlled and specified amount of postage can be printed as indicia marks with final "mailing" address (specified by the customer) at a given mail room. Using the disclosed invention, even an employee of the customer can not, therefore, clandestinely "stamp" additional mailpieces to that or another address.
Each host computer interfaces with the encryption unit to generate a data matrix symbology which includes specified information that the customer selects represented by indicia, in addition to the information required by the postal service. Information selectable by the customer is entered into the customer's host computer terminal. The encoded indicia is sent via modem to a specific printing site where the encoded marks received by the indicia printer and is printed on the mailpiece at the printing location which is typically remote from the control computer. This matrix is downloaded to the indicia printer for marking the mailpieces. Following the placement of the indicia mark, a verification of the printed indicia is conducted by a camera which compares the mark as printed with the mark directed by the printer PC. The mailpieces are then ready to enter the postal system where they can be scanned at various steps in processing and distribution by a field reader to verify authentic indicia. Once the reader has captured the data from the scanned mark, communication is established by the reader with the control computer and also the host computer. The control computer verifies authenticity against the postal service data base criteria. The host computer compares the scanned mark with marks in its database to determine the authenticity or obtain tracking information based upon the customer's criteria.
In the context disclosed above, the "customer" can also be a PC-based "home office" equipped with a postal security device (PSD), encryption software, and a standard PC operated printer.
The present invention also provides apparatus and methods for controlling and enabling the authentication and tracking of other material or items such as consumer goods to reduce the amount of counterfeit goods and to reduce the shipping of authentic goods to unauthorized points of final distribution. The method includes generating a unique pattern comprising an encoded input data entry stored on a mass storage device accessible by a CPU where the input data comprises a final point of distribution and a unique manufacturer identifier, and where the encoded data entry comprises a digital encoding of the input data. The unique pattern is preferably applied to mailpieces of the goods using an ink formulation comprising one or more chemical agents detectable when exposed to a visible or non-visible wavelength range of light. Non-visible ink can be selected such that the pattern can be "overprinted" on other marks which are visible under normal light conditions, and these overprinted marks can subsequently be read without interference from the visible markings. Alternately, the pattern is applied to the goods or mailpieces by other methods such as etching, printing, painting or embossing. The pattern can also be applied with an ink jet or thermal printer. The method further comprises exposing the marked items with light in the visible or non-visible frequency range thereby making the pattern detectable, scanning the detectable pattern on the goods, decoding the pattern to retrieve the encoded data, and comparing the encoded data against stored encoded input data entries in the mass storage device data to determine if the goods are authentic and if the specified destination is correct.
The present invention provides apparatus and methods for marking the final point of distribution of mailpieces or consumer goods, and a method for verifying the final destination of mailpieces or goods, including a means for generating a unique pattern comprising an encoded input data entry stored on a mass storage device accessible by a CPU where the input data comprises at least a unique destination identifier and where the encoded data entry comprises a digital encoding of the input data, a means for applying the unique pattern to the goods using an ink formulation comprising one or more chemical agents detectable when exposed to a visible or non-visible frequency range of light, a means for exposing the goods with light in the visible or non-visible frequency range thereby making the pattern detectable, scanning the detectable pattern on the goods, a means for decoding the pattern to retrieve the encoded input data entry, and a means for comparing the encoded input data entry against all stored encoded input data entries in the mass storage device data to determine whether the goods are authentic and properly distributed.
The present invention also provides a method for authenticating indicia marks to reduce the amount of counterfeit marks including entering input data, by the customer, comprising at least a unique customer identifier and/or entering input data, by the postal service, comprising a unique postal service identifier into a CPU, encoding the data in a machine readable format, storing the data in a mass storage device accessible to the CPU, generating a unique pattern incorporating the encoded input data, and applying the unique pattern as an indicia mark to mailpieces using an ink formulation comprising one or more chemical agents detectable when exposed to a visible or non-visible frequency range of light. Alternately, the unique pattern can be printed on a fixture which is permanently affixed to the mailpiece. The authentication process is completed by exposing the goods to light in the visible or non-visible frequency range thereby making the pattern detectable, scanning the detectable pattern on the mailpiece or on a fixture affixed to the mailpiece, degenerating the pattern to retrieve the encoded input data, transmitting the total image pattern or alternately transmitting a representative ASCII string, decoding the encoded data to retrieve the input data, and comparing the input data against all stored input in the mass storage device data to determine whether the indicia are authentic. Alternately, the scanned pattern can be directly decoded in clear text for display and for evaluation at the location of scanning, and without comparison against marks stored in the host or control computer databases.
The present invention also provides an authenticating system including a means for entering input data comprising at least a unique destination identifier and/or a unique customer identifier into a CPU, a means for encoding the data in a machine readable format, a means for storing the data in a mass storage device accessible to the CPU, a means for generating a unique pattern incorporating the encoded input data, a means for applying the unique pattern as an indicia mark to mailpieces or to a fixture attached thereto by printing using an ink formulation comprising one or more chemical agents detectable when exposed to a non-visible frequency range of light, a means for exposing the goods with light in the non-visible frequency range thereby making the pattern detectable. The present invention also provides a means for scanning the detectable pattern on the mailpieces, a means for degenerating the pattern to retrieve the encoded input data, a means for decoding the encoded data to retrieve the input data, and a means for comparing the input data against all stored input data in the mass storage device to determine whether the goods are authentic and are at the specified final point of mailpiece delivery.
The present invention further provides a method for monitoring the flow of mailpieces through a postal processing and delivery system including generating a unique pattern comprising an encoded input data entry stored on a mass storage device accessible by a CPU where the input data comprises one or more of a unique postal service identifiers, a unique customer identifier, a unique point of mailing identifier, a unique destination identifier, a unique postage amount, an unique mailpiece weight, and time and date information and where the encoded data entry comprises a digital encoding of the input data, applying the unique pattern to the mailpieces, or to a fixture attached to the mailpieces, by printing using an ink formulation comprising one or more chemical agents detectable when exposed to a visible or non-visible frequency range of light, exposing the goods with light in the visible or non-visible frequency range thereby making the pattern detectable. The present invention further provides means for scanning the detectable pattern on the mailpieces or fixture attached thereto, degenerating the pattern to retrieve the encoded input data entry, and decoding the encoded data to retrieve the input data to confirm delivery data.
The present disclosure provides an authenticating and/or tracking system in which an indicia pattern is placed on mailpieces, or alternately placed on a fixture attached to the mailpieces, wherein a portion of the symbol is not visible on the mailpiece under normal light conditions. Likewise, it is preferred that the symbol be relatively resistant to removal by abrasion during the processing and distribution of the mailpieces. Still further, it is preferred that the indicia mark be relatively immune to tampering and removal, preferably rendering the mailpiece on which it is printed or to which it is attached undeliverable if tampered with or removed. The symbol may be detectable in visible light or, alternately, only portions detectable under visible light and portions detectable upon exposure to certain wavelengths of non-visible light such as UV light, IR light, microwaves, radiowaves, or other frequencies of light.
BRIEF DESCRIPTION OF THE DRAWINGS
For a more complete understanding of the present invention and the features and advantages thereof, reference is now made to the Detailed Description in conjunction with the attached Drawings, in which:
FIG. 1a illustrates the geographical layout and major components of the invention, configured as a postal indicia system, using a functional block diagram;
FIG. 1b is a schematic block diagram showing a portion of the system, utilizing a single host computer, which both marks items with encoded indicia symbols, stores the symbols in machine readable format for easy recall and comparison, and subsequently reads the symbols in accordance with the teachings of the present disclosure;
FIG. 2 shows a portion of an item and a location for applying the encoded patterns or symbols;
FIG. 3 shows a representative indicia symbol placed on an item;
FIG. 3a shows a representative indicia symbol placed on an item;
FIG. 3b shows a representative indicia symbol placed on an item;
FIG. 4a is a back view of an indicia printing machine in accordance with the teachings of the present disclosure;
FIG. 4b is a side view of an indicia printing machine in accordance with the teachings of the present disclosure;
FIG. 4c is a top view of an indicia printing machine in accordance with the teachings of the present disclosure;
FIG. 5 is a top view of a item carrier detailing the vacuum ports; and
FIG. 6 is a side view of a hand held field reader.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The system of the present invention generally comprises four components: (1) a control or "master" computer which is located at a central location and which enables the entire system; (2) preferably a plurality of host computer located at a geographically diverse locations; (3) a plurality of marking systems or "indicia printers" cooperating with each host computer; and (4) preferably a plurality of portable field readers cooperating with each host computer, the control computer, or both the hosts and control computers.
FIG. 1a illustrates the layout of the invention, embodied as a postal indicia marking system, using a functional block diagram. Assume, for purposes of discussion, that the invention is being used by a the United States Postal Service (U.S.P.S.) to mark and track mailpieces throughout the entire processing and delivery system. The system replaces prior art postage meters and postage stamps as means for indicating that proper mail fee has been paid for each mailpiece. The components communicate so that one or all components can be located at sites far removed or "remote" from one another. In the example shown in FIG. 1a, the control computer 12 is indicated by a broken line box which encompasses a box 12' representing the manufacturer or "vendor" of the system, and the U.S.P.S. 12" which is the director of the system. The control computer 12 can be located at the system vendor's headquarters, or even at the postal service headquarters. Data are readily transferred between the U.S.P.S and the vendor. Stated another way, the control computer 12 is typically controlled by the U.S.P.S even though it may be physically located at the vendor's place of business. Alternately, there can be more than one vendor of the indicia marking service, and therefore there can be more than one control computer 12 with all being under control of the U.S.P.S.
Referring to FIG. 1a and momentarily to FIG. 1b, the control computer 12 cooperates with a plurality of host computers through a modem 11. Three host computers 14', 14 and 14" are shown, but it should be understood that any number "X" of host computers can be employed. Typically, each host computer is controlled by a single user or "customer" of the service, which can be located anywhere within the United States or even abroad.
Again referring to FIG. 1a, each host computer cooperates with the control computer 12 through a postal security device (PSD) which is typically an enigma card as will be detailed in subsequent sections. As an example, host computer 14' if functionally cooperative with the control computer 12 through a PSD 400'. The PSD units secure confidential information, belonging to the vendor 12' or the U.S.P.S 12" and stored in the control computer 12, from being accessed by the various user companies through their host computers. Furthermore, the PSD units insulate the plurality of host computers from the control computer 12 so that confidential information from one host computer controlled by one company can not be clandestinely or inadvertently transferred to the host computer of another company via the control computer. The control computer can be used by the postal service or by the vendor to conduct electronic audits of all PSD units, i.e. enigma cards contained in or attached to the various host computers.
As illustrated in FIG. 1a, each host computer controls one or more indicia printers. For purposes of clarity, only one indicia printer is shown cooperating with each host computer. As an example, host computer 14' belonging to customer "1" controls the indicia printer 20' The indicia printer marks the mailpieces with an encoded mark indicating first that the proper postal fee has been paid in order to "mail" the mailpiece. This marking process, as will be subsequently discussed in detail, is essentially "tamper proof" when compared with current postage metering systems and convention postage stamping methods. This saves the postal service, as well as the customers, considerable sums of money which would normally be lost to postage fraud. The indicia printer can also encode information in addition evidence that the proper postal fee has been paid for the mailpiece. This information can be supplied by the postal service, by the customer, or even by the vendor. Such information includes a dates and times of processing, locations of processing, accounting information, standardized addresses, audit functions, authorization codes and the like. This input is possible because the customers, the vendor (or vendors) and the postal service all have input capability within the system.
Once marked, the mailpieces enter the mail system 402 as illustrated conceptually in FIG. 1a. At any point within the mail system, such as a processing point, sorting point, distribution point, delivery point and the like, the indicia mark affixed to the mail piece can be read on site with a U.S.P.S. filed reader 18. All information contained in the indicia mark is used on site, transmitted back to the appropriate host computer if the information pertains directly to the customer or is "customer specific", or transmitted back to the control computer 12 if the information pertains to the postal service operation or even the vendor's operation. Operational details and system capabilities will be detailed in subsequent sections of this disclosure.
FIG. 1b provides a more detailed schematic diagram that represents a single host computer 14, and related components, of the present invention. In FIG. 1b, the numeral 10 generally identifies the authenticating, anti-counterfeiting, anti-diversion system for indicia marking and tracking mailpieces and other goods. The single host computer is identified by the numeral 14, and stores the selected, customer specific information conveyed by the indicia mark and directs the indicia printing system 16 to incorporate that information into the indicia mark on the mailpiece module. The control computer 12 supplies the postal service information to be included in the indicia mark. The host computer 14 also receives and processes customer and postal service specific information from the reading system 18. The host computer 14 is connected via modem 11 through a PSD 400 to coordinate, receive, and respond to postal service data and commands sent and received from the control computer 12, and is also connected to a marker terminal or processing unit CPU 27 in the indicia printer 16, and to a reading terminal 22, preferably a personal computer. Connection can also be accomplished by making the system an integral part of local and wide area networks (LANs and WANs), or even the Internet.
For purposes of discussion, it will again be assumed that the printing system 16 is a postal indicia printing system, and that the marker 20 is an indicia printer. In operation, the control computer 12 contacts the host computer 14 and enables a specific number of imprints or, alternately, to distribute a specific amount of postal fee. As an example, the control computer may enable the host to imprint 100,000 32 cent mail piece indicia. The host computer establishes an appropriate identifying message using clear text. The host computer 14 interfaces with an encryption unit 15 which converts the clear text message into an ID matrix symbol. The host computer then downloads the digital symbol to the marker CPU 27 controlling the marker 20 which, for purposes of discussion, is a printer. The host also establishes printer start/stop serialized numbers and specific times the printer can be in operation, i.e., 0800-1600, Monday through Friday. The host downloads the ID string and a "start" and "end" count to the CPU 27. The CPU's software encrypts the ID string including the serialized counts starting with the "start" count and stopping with the "end" count. Once the print cycle begins, a CCD camera 28 mounted downstream from the printer in the marking process maintains a continuous validation that an appropriate indicia symbol is being printed onto the product. If the printed symbol is different from that provided by the marker CPU 27, an error signal is activated to alert the operator. At the conclusion of the marking cycle, the printer CPU uploads a print count to the host. The postal service or the vendor can conduct electronic audits of all host computers at any time.
From this point forward, marked mailpieces can be identified and verified through the use of the field reader system 18. Typically, a plurality of field readers cooperate with a single host computer 14 and with the control computer 12, and are at locations remote from the host and control computers. It should be understood that the mailpieces can be marked directly, or that one or more fixtures can be marked and affixed permanently to the mailpieces. The mailpiece items are identified and verified by using a light of appropriate wavelength to illuminate the symbol on the items. The illuminated symbol is captured by the camera 29. The captured image is then transferred to the portable PC 22 where the data is enhanced (if necessary), compressed, and transmitted via a modem 26, cellular link, or satellite communication to the host computer 14. Alternately, the captured image can be decoded into clear text using the PC 22 and displayed at the site of the field reader system 18 for visual analysis. As an additional option, fixed readers can be used during mail sorting operations to detect postal fraud and the like.
The control computer 12 and the host computer 14 receive the data from the field reader, and interfaces with the encryption unit 15 where the message is decoded and converted to clear text. Either the total image or an ASCII string representing the image can be transmitted from the field reader 18 to the host computer or to the control computer. The control computer then searches the database to validate the indicia mark and any other postal service specific information. The host computer reads and validates any customer specific information. Once validated, both the control and the host computers send messages back to the field reader 18 which displays the decoded message and any other pertinent information pertaining to this specific indicia, i.e., place, time of marking, or destination. If the marked mailpiece is counterfeit or has been received at the wrong point of final distribution, an invalid signal is transmitted and displayed on the field reader computer screen at the PC 22.
Alternately, if a lower level of security is acceptable, the indicia symbol can be decoded at the field reader system 18 and, at the option of the user, all pertinent goods or product data such as plant of manufacture, style, lot number, destination and the like can be displayed on the field reader computer screen at the PD 22.
To further enhance security, all transmissions between the control computer 12, host computer 14, marker CPU 27, and field reader systems 18 are conducted through PSD. enigma cards 400 which are initialized when the network is activated.
The control computer 12 provides an allotment of marks to the host computer 14. This communication is carried out via corresponding enigma cards. The enigma cards will be discussed in detail below. Once the host computer has received an allotment of marks, or an allotment of postage, or the like, it enables the marking systems to imprint indicia marks on the mailpieces as specified. The host computer is limited in its ability to enable the indicia marking systems to impart marks to the extent that the control computer 12 has provided to the host the requisite number of marks, or postal fee, to cover the directions sent to the marking systems. The host computer interfaces with the encryption unit to generate a data matrix symbology which represents specified information that the postal service and the customer selects to be represented by the indicia mark or symbol. Generally, selected specific information, which represents the mark or symbol, is entered into the host terminal 14. An ID string, such as a five alpha ID string, and the "start" and "end" counts are sent via a modem 24 to indicia printing system 16 where it is encrypted by the software of the marker CPU 27 and is printed onto mailpieces at this remote marking location. This matrix is downloaded to the selected indicia marking system for use by the marker 20 in marking the mailpieces.
Following the placement of the mark by the marker 20, a verification of the imprinted mark is conducted by the camera 29 which compares the mark as imprinted with the mark directed by the printer PC. As a result of this marking, the mailpieces can be scanned by a field reader 18 to determine the presence of authentic marks. Once the reader has captured the data from the scanned mark, communication is established by the reader with the host computer 14 and the control computer 12. The control and host computers compare the scanned mark with marks entered in their databases to determine the authenticity of the mark or to track the items. The scanned mark can also be decoded into clear text by the reader system 18 and displayed on the screen (not shown) of the computer 22. The host can also download an ID string to the CPU controlling the marker. The PC then uses software to convert the ID string into symbols which are then printed; that is, ABCDE 00001 is converted to a matrix at the printer.
The foregoing discussion has been directed to the invention embodied as a postal indicia marking and tracking system. Other embodiments of the system for anti-counterfeiting and anti-diversion systems are also possible. An added feature of the present invention is the real-time nature of validation in any embodiment. Piracy, counterfeiting, and/or diversion commonly occur at the plant or just beyond its gates. The present system allows the functionality of immediate interception on the yard, or the backdoor of the plant. A field reader may be used for inspection at the plant gate to verify that goods going out of the plant gates are authentic, marked, and correctly routed. As a further example, a field reader or point of distribution and sale reader may be used to "instantly" authenticate a package module, mailpieces, invoices, or any marked article at the time of receipt, sale or processing. It should be understood, however, that this can only authenticate the printed document, and can not authenticate any signature affixed thereto which may or may not be forged. The creation and marking of marks is real-time. The marker PC at the site reports back to the host computer and therefore all the markings that have been prepared for the day's operation will be in the archives or in the records of the host computer 14. Immediately after the goods are marked, they can be inspected and a reading determines the (in)validity of the mark through the host computer 14.
The only lag time is that which is required to transmit from a field or point of sale reader to the host then back to the field reader to obtain validation. The field reader remains connected while the host computer decodes and checks the data host for the scanned mark. The reader receives validation while the goods are under the custody and control of the reader operator.
Two pricing accounting/security systems are also provided within the system. First, the control computer 12 enables the host by providing an allotment of marks or fees, and tracks the number of marks allotted to the host computer. Second, the host computer allots a prescribed number of marks to the marker and thereby enables the marker to affix marks on the goods or materials. In addition, the host tracks the activity of the markers and counts the marks made at the marking locations.
The present invention ensures that authentic goods are routed to the correct destination. Items diverted, and counterfeits lacking the identifying marks, are located. In the case of many products or goods like handbags, trading cards, works of art, or any other article where authenticity adds to the value of the item, the system can be used to guarantee authenticity. Authenticated routing also adds to the value of mailpieces, insuring that merchandise contained within is not counterfeit. A certificate of authenticity can be provided at the final point of distribution.
The system and method of the present invention is also particularly well tailored for use by customs agencies and clearing houses around the world for quick and easy inspection of goods entering a country, thus facilitating detection of counterfeit and misdirected articles. For example, such information may include information relating to the domestic representative in a foreign destination for the goods. In this embodiment, the central or control computer 12 communicates with the host computer 14 to provide the host computer with an allotment of imprints. The enigma card enables a secure communication to be established between the control computer and the host computer and between the host computer and the marker which is, for purposes of discussion, a printer. The central or control computer 12 can access the host's network to re-enable the host computer 14 with another allocation of imprints. Once the host expends its allotment of imprints, the whole system shuts down. The host must then call the central computer and be re-enabled through the acquisition of an additional allotment of imprints. In a similar way, the host computer 14 can access each printer under its control to re-enable the printer with another allocation of imprints. Once the printer expends its allotment of imprints, the whole system shuts down. The printer must then be re-enabled through the acquisition of an additional allotment of imprints from the host. As an example, unauthorized cases of cigarettes, destined as contraband, can not be marked once the authorized printing allotment has been completed. Any additional allotment must be authorized by selected personnel.
The enigma card has its own microcontroller, random access memory (RAM), and storage capability. It, also has its own program so when the host establishes a connection with the printer location, the host is actually communicating directly through the enigma card. The enigma is constructed to be tamper proof.
The enigma card microcontroller is programmed to manage its own on-board memory. Any writing to the memory is managed by the on-board microcontroller and that on-board microcontroller talks to the PC and the PC talks to the host through the modem.
The enigma card has an on-board security bit that can be set to protect internally programmed software codes and security codes. It is commercially available, having custom software codes and security codes that are not readily readable. The host actually has the same enigma card as the printers located at the manufacturing site. The computer at the printer location, however, may have limited software that limits its ability to use the enigma card.
When the host computer 14 contacts the marker CPU 27 at the printer location, the first step is to establish a coded communication. Once the protocol for the coded communication is set, the printer location enigma card continually monitors either every print or some block of marks created and imprinted at the printer location. The printer location enigma card tracks the number of marks against the allotment from the host computer 14. When the enigma card detects that the allocation of marks for the specified period of time has been exhausted by the printer, then the printer location enigma card immediately prevents additional marking. The printer can no longer operate without authorization from the host computer enigma card to the printer location enigma card.
Marking information at the end of a manufacturing run, or alternately a mailpiece marking run, is transmitted to the host computer 14 via the respective enigma cards before the line is disconnected. This information may include the quality of marking by the printer and the quantity allocated but unused by the printer. At any given time, the host computer 14 can also interrogate a printer and gather this information. This can be done on a random or a spot check basis.
The control computer 12 periodically updates its own database to reflect the number of imprints allowed by the host computer 14 and marked by the marking system. Embodied as the previously discussed postal indicia marking system, the control computer 12 is controlled by the postal service and can be located at postal service headquarters or at the vendor facility, or both. The control computer serves an internal audit function which tracks the uses of various host computer systems. The control computer downloads an allotment of imprints to the respective host computers. These imprints are then held in the memory of the host computer 14. The host can only enable marking systems to mark the number of marks allotted to its bank. Once this allotment has been depleted, the host computer 14 must once again be enabled by the central or control computer 12 through a replenishment of its internal bank of marks or other allotments.
The host computer 14 controls the marking process by enabling the marker CPU 27 at the marking location and determining the number of imprints which will be used by the marking system for a particular lot, order, final destination, day, week, month, etc. For postal indicia marking, postage fee is printed. The host dictates to the marking PC the number of available prints/marks for a particular run. The host controls the manufacturing plant by allocating and tracking the number of goods which will be printed. The allocation and tracking information is, however, established by the control computer 12 and downloaded to the host computer 14. Optionally, the controller at the marking location will not know what symbol is being printed nor what code is being printed that day. The marker controller has no way of changing the code that is supplied to it by the host computer 14. In addition, the controller may be prevented from reading the code as supplied to it by the host computer 14.
The system is able to allow the host computer 14 to change the code at any time, even during a marking run. The host computer 14 can also interrupt a cycle at any time and change the code. Alternately, such a changes may be made at the control computer 12 level for added security. If the host controller believes that the code has been compromised in some fashion, the code can be changed entirely and the operator at the print location need not be notified of the change. Code changes may be implemented after allotment to the remote marker location when warning flags indicate that the security systems, including the enigma cards, have been compromised or may be done on a random basis. This is possible because the two computers are in communication during the marking run, and the marker operator is unaware of the symbology being printed. The code is preferably changed on a random basis.
The input data, encoded entries, and marks are kept as a confidential collection of data within the control computer 12. Using this approach, specific information can be logged which facilitates tracking the flow of goods and possible identification of counterfeit goods or items, i.e., goods or items not marked or not marked properly.
The encryption method is encoded on a microcontroller, using, preferably, a table encryption method. The marker location requires that its enigma card, which is actually a PSD in the preferred embodiment, establish a coded communication with the host computer. Once the communication has been established between the enigma cards, then various program files are executed. The host computer 14 then determines how many marks have been used by the marker, enables more marks if needed, removes marks if required, and enables marking for a specified time period.
The PSD plays a role in providing a starting and an ending accounting number. Any communication with the marker is in a coded format which requires the PSD to instruct the marker how to make these marks and how many to make.
In the preferred embodiment, a digit code is downloaded to the marker location after the security protocol is established between the host computer and the marker location on the computer security device. As soon as verification that a secure transmission link has been established, a coded transmission is then exchanged from the host to the remote marker location.
The conversion of the identifying information into the matrix is accomplished through the use of a computer program. As an example, I.D. Matrix located in Clear Water, Fla. provides a patented system for encrypting information and enabling conversion of an alpha/numeric code into the symbology format of the present invention. The present invention can use other symbologies such as PDF417, 1-D bar codes and the like. The chosen symbology is only a means for accomplishing host data base authentication, encrypted data transmission, enigma card control and electronic audit capability made possible with the disclosed system.
Following the creation of the data matrix symbology, the host computer 14 downloads the matrix symbology digitally across a modem, the Internet, or other communication means to the remote marker location. Once the symbology has been encrypted, a pictorial representation of this encrypted message comes up on the computer screen at the host computer 14 for verification and appears as a checkerboard of black and white squares. At that point, the matrix symbology is downloaded to any remote marker location via the enigma cards. At the time downloading occurs, a proprietary system loaded on each enigma card scrambles the digital data to prevent interception of this message. An encryption card is loaded in the host computer's enigma card and a matching encryption card is loaded in the enigma card located at the remote marker location. The transmitted message is then reassembled at the marker location through the encryption chip at the marker location. Once the basic symbology is downloaded, the marker location computer is able to serialize the marks (i.e., 00001, 00002, etc.). This numbering system is an inventory control system as well as a security system because the host computer allocates a number of imprints to the marking system for a particular lot, order, destination, day, week, month, etc.
As an example, the first item, such as a mailpiece with a first postal fee, receives the number ABCDE 00001. The second mailpiece, with a second postal fee, receives the number ABCDE 00002 and so on through the marking cycle. These might include mailpiece or product identification, final point of distribution, delivery lot number and the like. Each character (e.g., ID string) represents particular information which is stored in the host computer 14. This serialized marking with selected customer specific data (unique count, plant, destination, date, lot or order) data is printed in the I.D. Matrix format. It should be understood that a particular marking is not limited to the illustrated ten alpha/numeric characters, but can comprise fifty or more characters. Furthermore, it should be understood that the number of alpha/numeric characters used in the markings is limited only by possible size restrictions placed of the matrix symbol mark imprinted on the goods. The marking information is sent back to the host computer 14 with the total inventory number once the manufacturing run has been completed or as the host directs the marker location. In the preferred embodiment, the security code is a ten character code comprised of five alphabetic and five numeric characters.
The marker location computer can request an allotment from the host computer 14, which number is either automatically allocated by the host computer or is specifically requested from the marker location. As added security, the allotment number is verified by the control computer 12. At this point, the marker location is not generating the code, but merely requesting authorization from the host computer 14. The host computer allocates to the marker a quantity of marks. Depending on the degree of control that the host computer requires, it can allocate for one day, one shift, one week, one month, or a whole year. The host-to-marker allocation method is thereby flexible enough to adapt to the needs of the particular type, of manufacturing operation.
The host computer 14 maintains a record of the number of marks used by a particular marking system. Recalling that a plurality of host computers are usually employed, the control computer 12 preferably records the number of marks used by each host computer 14. This accounting occurs through the PSD. The enigma card protects and controls how many copies are made and how many marks are made. The marking system updates the host computer 14 on a periodic basis with respect to the number of marks used during a specified cycle or run. This transfer of information can be programmed to occur on a random basis or at selected predetermined intervals. For example, if the marker is allotted 5000 imprints, but only 4,337 are used at the end of the day, the marker location computer will report back to the host computer that only 4,337 imprints were made. The system, thereby, functions as an inventory control, audit system as well as a security system. This is particularly useful in the context of system licensees. This feature facilitates license agreements on a batch unit basis and keeps strict control over licensees for royalty purposes.
The mark, pattern, or symbol which is applied to the material can be as simple as a logo or brand identifier, but in the preferred form of the present disclosure, the mark, pattern, or symbol includes the encoded data and is typically requested in a symbology format such as the I.D. Matrix format. The data can be quite substantial, including such information as the lot number, a manufacturer identification number, the particular market destination (i.e., the country or state), a product identifier, a company identifier, and time, date, and place of manufacture. The mark can also include data representative of the particular plant in which the goods are manufactured and packaged, and any other information which is represented alphabetically, alphanumerically, graphically, or the like and can be associated with the mailpieces. As examples, marks for products include final point of sale, and associated financial documents can include account number, sequential identifying numbers, and the like. All such information, i.e., input data, encoded entries, and the marks, are stored in mass storage devices for later use in goods verification/authentication, tracking, and/or counterfeit detection.
As an example, if it is known in advance where a product will be manufactured and packaged, i.e., packaging material is to be shipped to a particular plant for scheduled use, then the time, date and location of the plant are known as well as the product to be made out of the material. Under such conditions, the mark applied to the packaging material can contain this information along with a goods identifier, destination and manufacturer identifier. Using mailpieces as a second example, one can mark with an indicia in which a portion of the indicia pattern is not readily seen on visual inspection. The mark can include chemical agents that are not visible until they are exposed to certain frequencies or wavelengths of visible or non-visible light which render them readable. Such chemical agents can include ultraviolet (UV) or infrared (IR) sensitive dyes.
In one embodiment, the symbology is printed using invisible ink so that the operator will have no way of knowing whether a valid symbol has been printed. More specifically IR activated inks are preferred to mark certain items in that identifying symbols can be overprinted on visible trade markings leaving the packaging of the product visibly unaltered to the naked eye. The identifying symbols can subsequently be read, using appropriate light sources and cameras, without interference from the visible trade markings. A reader, however, is located down the line and scans the marked articles, illuminates the mark and verifies the data matrix indicating that it is indeed a readable mark. The hardware and the software on the ground at the marker determine the number of valid marks imprinted on a particular run of goods.
The marks and symbols are comprised of encoded information represented by an alpha/numeric code. As an example, a ten character alpha/numeric code is entered at the host computer 14. Five characters would be alpha and five characters would be numerical, i.e., ABCDE 00001. The marking system could be reversed so that the numerical side may be used for the purpose of providing such information as plant, lot number, customer number, account number, document number, etc., while the alpha symbols may reflect a sequential accounting. Once the code is selected and entered, it is encrypted into the form of a data matrix which resembles a crossword puzzle or a checker board. Selected encoded information is distributed at random within this matrix. Typically, the symbology will consist of nothing more than black and white squares once exposed to UV or IR light. ABCDE 00001 is converted into a distinctive checker board data matrix symbology. As items are imprinted, the code changes. Using the example from above, the number increases to ABCDE 00002 and a second unique checker board data matrix symbology is created and imprinted on the second item. The second symbol does not resemble the first one, other than the fact that it consists of black and white squares.
The marking operation can be either operator initiated or clock initiated. The marker itself has a computer in it and is controlled by the enigma card and the modem link. In response to the enigma card and modem link, the marker location computer controls the print heads that actually print this I.D. matrix. The marker also has the software to generate the I.D. matrix from the data provided by the host.
A suitable transporting system, i.e. a conveyor, moves the mailpieces, package modules, or the goods themselves, underneath the print heads at a predetermined speed so that the print heads can imprint the encrypted code that has been established at the host computer on the fabric or goods.
The print machine comprises a closed loop system that monitors the imprinted material as it comes through the line. A detector examines the imprints and detects whether a valid imprint has been made. The detection step is performed using a camera. If a marking error occurs for whatever reason, e.g., the ink runs out or a misprint occurs, a signal or a beacon may be activated to allow the local operator to make a command decision as to whether to continue to print, continue his production without marking, or to stop the process and troubleshoot the problem. The software package counts valid marks and stores this number for transmission to the host computer 14. Ultimately, these valid marks are debited from the host computer bank. The on-line verification reader is typically located six to eight inches down the manufacturing line from the marker. The verification reader reports to the marker location computer, which reports to the host computer 14 at the end of the day or other specified period. If misreads or mismarks occur or the full allocation for the day is not exhausted, the host computer is informed at the end of the day or other period.
As a general statement, the system can be used to read random marks, decode, convert to ASCII string, transmit to host, assign that ASCII mark to a specific shipment, postal permit, PO number, destination, pack, carton, case and the like. In an alternate use of the invention, it might be desirable to mark material early in the manufacture cycle, and trace or read the products at various states of the process until the product is completely finished. In this application, care must be taken in the method used to affix the mark. Using the example of manufacturing blue jeans using prewashed fabric, assume that the manufacture of a pair of "washed" jeans is to be traced by initially marking the cloth used in the process, and then reading the mark throughout the manufacture process which a washing step. Further assume that the identifying marks are printed on the cloth. The ink used must be selected to withstand each manufacturing step, and in particular, selected to withstand the washing step. It has been found that suitable inks are available. Waterproof inks can also be used so goods can be marked at any point of production. More specifically, inks are available that can survive more than fifty commercial washings and have been used to mark rental uniforms for tracking.
The print location controller enters a user I.D. and input data detailing destination, shipping instructions, etc. to the host computer through the enigma cards. The confirmed request or order is transmitted to the marker location computer in encrypted code format by the host PC.
In the case of apparel, the present authenticating system has the advantage that permanent marks are not required, i.e., the marking formulations can be water soluble or soluble in a variety of organic solvents. The general chemical family is classified as derivatives of stilbene fluorescent compounds with emissions in the range of 450 NM when exposed to UV radiation. Thus, for goods that are normally not washed before retail sale, such as jeans, the present disclosure sets forth a system in which temporary markings are placed on the goods. However, the compounds exhibit at least some permanence when used on some products, i.e., leather.
The marks, symbols, or patterns used in the present invention can also be made permanent through the use of permanent chemical agents. Permanent markings can be especially useful with goods that are not typically washed or with goods where accurate product tracking data is highly desirable. As an example, handbags are typically not washed and may have a life in the possession of a consumer of several years. Thus, it may be important to know the source of those handbags even years after the original sale to investigate after market information or product demographics. Even when a handbag is several years old, it can be checked using the present invention to determine the manufacturing lot number and other data contained in symbols which were placed on the handbag during manufacture.
The marks, symbols, or patterns suitable for use in the present invention can include, without limitation, codes such as UPC symbols, data matrix symbols, graphic symbols such as logos, pictures, images, and the like, encrypted data in textual, numeric, binary, octal, hexadecimal, alphanumeric, or the like, or any other data encoding format. The item is marked in a suitable pattern as shown in FIG. 2. FIG. 2 shows a segment of a mailpiece, such as a 9 inch×12 inch mailing envelope. The dotted lines at 32 and 34 represent guidelines within which the indicia markings are placed. It is well known in advance where the marking guidelines 32 and 34 will be located with respect to the overall dimension of the envelope. For instance, they can be located at the upper right hand corner of the envelope. The markings are preferably located so that the two guidelines 32 and 34 assure that the repetitive marking process locates the symbols at the desired location on mailpieces such as the mailing envelopes in the example. Alternately, only one mark can be applied, or more than two marks can be applied to facilitate the scanning process, especially at the final point of distribution.
If required, two sets of indicia markings can be applied to an item through the use of two duplicate ink jet printers. Indeed, four or five duplicate ink jet printers can be used in parallel to provide even more markings on an item. When using multiple heads, each head can be programmed to print the same matrix at a different physical location, or each head can be programmed to print different serialized matrices. Alternately, and depending upon the types of print heads used, one nozzle can be used to print clear text data such as ABCDE00001, and the other nozzle can be used to print the equivalent encoded matrix. With each of the above alternate methods of marking, the markings are preferably applied repetitively at the same physical location of each marked article.
By way of example, representative symbols are shown in FIGS. 3, 3a, and 3b of the drawings. Without regard to the meaning of the symbol shown in FIGS. 3, 3a, and 3b, it is readily understood that the symbols encode a set of data which enables unique identification of a lot of goods and date of manufacture of these goods. Moreover, the set of symbols shown are particularly useful because the location of certain portions of the encoded data is not specifically known. For instance, protection against counterfeiting of the numbers for purposes of printing authentic, but unauthorized indicia marks can be implemented. As one example, every symbol in the data indicated by the numeral 56 (shown in FIG. 3b) can be generated by a random number generator and have absolutely no significance. By contrast, symbols in the region at 58 (shown in FIG. 3b) can have significance when decoded. This can be used to enhance the security of the encoded symbol on the bulk cloth. An alternate embodiment is the bar code which is used for UPC identification. While that particular code need not be used, it is acceptable in terms of format.
One preferred procedure for applying the indicia marks to the mailpieces uses a typical ink jet printer which directs a spray of a chemical formulation onto the modules. The chemical formulation can be an ink or similar composition that can be applied in a predetermined pattern to the modules or, alternately, to the packaged goods. As applied, it is formed into a specific pattern representing either encoded data or raw data. The pattern can be in accordance with the UPC symbols or the like.
In another aspect of the present invention, the ink jet printer applies identifying marks using a dye along with a volatile solvent which evaporates, leaving the markings on the marked item. In this embodiment, the ink used is a proprietary product of Trident, Inc., Bloomfield, Conn. identified as FL-61. Preferably, the markings are of the sort which are not readily visible to the eye, but are readily seen or detected upon exposure to non-visible light sources such as on exposure to UV or IR light which causes the mark to become illuminated or visible to the eye. Of course, the exposure need not make the mark visible to the eye. All that is required is that the mark become detectable in some fashion so that the system can discern the mark, decipher or decode the mark and verify the authenticity of the mark. If desired, a permanent dye can be used.
The anti-contraband, anti-counterfeiting, and tracking system aspects of the present invention contemplates marking mailpieces, raw materials, intermediate products, products, or package modules of products with a symbol or pattern which conveys authenticating information, storing this information in machine readable format in a computer database, and using a field reader to identify authentic, or counterfeit, or contraband package modules or goods.
The indicia marking aspect of the system of FIG. 1a includes a remote modem 24 (see FIG. 1b) which communicates with a host computer 14 and a marker for imparting the patterns or symbols on the goods or mailpieces or, alternately, on one or more fixtures affixed to mailpieces or other items or products. In like fashion, the system of FIG. 1a can be used to mark mailpieces comprising paper, cardboard, leather or plastic, e.g., cellophane, waterproof sheet plastic, woven nylon cloth, etc.
Attention is now directed to the marking system of FIG. 1a, and the embodiment of the system shown in FIGS. 4a-4c, which will be described in detail. As an example, items being marked can be package module mailpieces. The system/host computer protocol operates as follows. The marker system 16 waits for the host computer 14 to call and download ID string (ABCDE) and the start/stop print sequence codes for the specific print cycle. Again, for purposes of discussion, it is assumed that the marker system 16 is a printing system and that the marker 20 is a printer. Print data is stored in memory on the enigma card. The ink jet printer head 44 is positioned at the requisite location to direct an ink jet onto the package module. The ink jet printer head 44 preferably applies an ink which is formed of two components, a dye and a solvent or carrier. The solvent is volatile and evaporates so that the dye is left on the marked package module. In this particular instance, the preferred dye is one which is not visible when impregnated into the surface of the marked item. In a preferred embodiment, no marking is seen in ordinary light by the unaided eye. Rather, the marking is visible when irradiated with a special wavelength of light as described. At the end of a print cycle, the marking system 16 calls the host computer 14 to upload the total print count for that cycle.
In one preferred embodiment in which the symbol is printed, the marking system 16 is comprised of an enclosed single 256/32 channel print head mounted at 90° to the path of the product or Dual 96 orifice/32 channel print head mounted at 27 degrees to the path of the product. The print heads are mounted on a swivel bracket assembly with a detent home position. The print heads are controlled by the print location computer, which accepts data for generating printed images from the host computer 14 via modem. The print location computer will typically be a personal computer. The data can be ASCII or graphic images. The print head(s) alignment is suitable for applications needing 64 bits of vertical resolution. The software is designed to print graphics images that are 64 dots vertical and 16 dots horizontal. By utilizing the printer bolderization parameters, the horizontal resolution can be extended to any integer multiple from 1 to 10.
The package modules, which are box mailpieces in the example being discussed, are positioned for marking on a conveyor station as shown in FIGS. 4a-4c. The conveyor station package module carrier pads 40 (shown in detail in FIG. 5) in front of an operator 42 who positions the "to-be-marked" section of mailpiece modules to be marked 43 on each pad 40 as the appropriate section passes by the operator 42. The to-be-marked section is smoothed and held by air-suction provided by engaging a carrier suction actuator 45 through the vacuum ports 47 on the pads 40 while it is being transported from the operator 42 to and under an ink-jet printer head 44 and optical print verification detector 46. The suction is then removed, and the marked package module is released.
A narrow electric-motor driven belt with multiple carrier pads 40 attached at spaced intervals circulates around an elongated oval track powered by a transport drive 48. In a preferred embodiment, ten carrier pads 40 are spaced at eighteen inch intervals. A straight section of the track in front of the operator 42 exposes the pads 40 for loading and connects the pads 40 to a vacuum system that provides the suction. At the far end of the straight track, beyond the print-head location, the vacuum connection is broken and the belt and pads curve around a drive-pulley under protective cover to begin their return to the loading operator 42.
A horizontal motor-driven conveyor belt 50 parallels the straight section of track along a line just below the carrier pad 40 to support and move mailpiece modules while their to-be-marked sections are on the carrier pads 40. The speed of the carrier pads 40 and the conveyor belt are perfectly synchronized so that the to-be-marked sections remain fixed on the pads until ink marking and checking are complete. The synchronized speeds are infinitely programmable over a range depending upon the complexity of the package module being marked and operator skills.
Once the mailpiece modules have been marked, the items can enter the mail system 402 (see FIG. 1a). Subsequently, mailpieces can be inspected at remote locations to determine whether the mailpieces are authentic, i.e. whether the goods have an authentic indicia marks which can be confirmed. In addition, specific information provided by the mark aids in the tracking of the mailpieces through the mail system 402.
The marker operator may provide the host computer 14 with detailed shipping information so that the host computer can modify the code to include this information. The marker controller may have the functionality to provide information to the host computer or the host computer controller may enter this information so that the information would be associated with the marks or symbols imprinted on the mailpieces destined for a particular region. Alternately, postal rate or fee information may be supplied by the control computer 12, and downloaded to the host computer 14.
The only information that the print controller will have at its disposal is a warning, i.e., low ink, low temperature on the print head, high temperature on the print head or some sort of malfunction and a screen which instructs him on how to troubleshoot the problem. If an emergency shutdown of the line occurs, a system lockout results and a supervisor must insert a key to restart the whole system again. This serves as a physical security measure.
The host computer 14 or marker can be informed of a run change so that the symbology can also be changed. This can be done on a real-time basis, and implemented by commands from the control computer 12 or the operators of the host computer.
The time, the date, the type of mailpiece, the count, the location of shipping, destination, the receiving party, the user ID and password of the supervisor or marker operator, the individual user ID and password of the authorized person or persons, and any routing customer information typically is represented by the symbology. Regardless of whether the code is random, sequential, or logically created in terms of the ten character preferred embodiment scheme, this information needs to be associated with the symbology.
The marker location computer will also interface with an optical reader 46 to verify product marking. The optical reader scans the marked products and cross references the scanned information with the encoded data. This procedure insures that the imprinted marks or symbols are properly placed on the goods package module and allows confirmation that the appropriate marks or symbols were placed on the appropriate goods or materials. The system can also randomly preprint products being combined for shipment to a specific customer, PO, destination, etc.
After the mailpiece package module has received its indicia marking from the marker, the module is scanned by a reader to confirm a valid marking. A camera is positioned to verify that a readable print has been made and that the information conveying positions of the symbols are readable.
The camera is preferably a charge couple device (CCD) camera. It is a black and white television camera with a solid state image center. However, any detection means capable of capturing the image is envisioned by the present disclosure.
The CCD camera illuminates the mark with UV or IR light and the CCD camera will capture the UV or IR illuminated image. The captured information will be fed to the computer which will verify that the expected print actually was printed. Either a match is obtained or not. If no match is obtained, the marker computer indicates a problem with the marker to the marker controller and to the host computer. As an example, if the marker is a printer, a plugged nozzle in the print head can affect print quality adversely and prevent the field reader from capturing the image so that it can subsequently be decoded. This cross referencing system allows early detection of marking problems before too many marks are printed that are unreadable.
The indicia marking system operates generally as follows.
An I.D. matrix is generated. The marker PC instructs the print head to print the matrix. The matrix will be saved and compared to the captured and processed image from the CCD camera and which compares the scanned mark with the mark generated by and stored in the database to determine the existence of a match. If a match is not made, a bad mark reading signal is received at the marker PC. In this manner, the marker operator is informed of a potential problem.
With the I.D. matrix, redundancy is built into the matrix system so that it is possible that even a poor quality mark can still be readable.
The validation occurs through the marker location computer. The matrix originates as a result of communication between the host computer 14 and marker location enigma cards, but, once created, the matrix itself is stored in the marker location computer. Marks can be debited or accounted for after verification if so desired.
The fourth component of the system is the field reader. The field reader is preferably a hand held device housed in a briefcase or the like. The briefcase typically comprises a power pack battery source, a laptop computer, and a hand held reader that is connected to the laptop computer. Alternately, the field reader can be a table top device connected to 110 volt AC "house" power.
The hand held version of the field reader will first be discussed. FIG. 6 shows a side view of a hand held reader. The hand held reader 90 has a handle 92, a CCD camera 94, a light source 96, an electronics module 98, a narrow band-pass filter 101, and a cord 100 for connection to the central processing unit. FIG. 7 shows the circular configuration of the light source 96.
The means for detecting or reading the activated indicia mark can be a bar graph reader such as is used to read the universal product code symbols (UPC hereinafter) in the case where the mark is a bar graph or any other type of reader used in conjunction with other arbitrary marks, symbols, or patterns. Preferably, a data block can be printed on the goods or modules used to package the goods, such as a mailpiece carton, where the data block includes light and dark areas (treated and untreated areas) in a given arrangement that can be read and converted into an encoded data entry or raw input data.
For reading, the encoded marks are read by illumination with the required IR or UV source. If the indicia mark is overprinted onto an existing visible mark such as a trademark or a logo on a mailing container, symbols printed in IR activated ink, and illuminated with one or more IR light sources, are preferred. Once obtained, the symbols are compared by manually comparing the marks or by using an optical scanner connected to a computer whereon there is a database containing the various range of entries. Such a database will commonly be stored in a table structure utilizing commonly available database software. This database of values, commonly seen in a "look up" table, provides the appropriate codes marked onto the product. The data base can be arranged to cross-reference and cross-validate various arrays of information that have been encoded. For example, the database, in the form of a look up table, can conveniently provide data indicative of origin. Should the markings be counterfeited, there is no basis by which the counterfeit indicia mark manufacturer will know the appropriate origin and destination data, thereby increasing the possibilities of detecting mailpieces marked with counterfeit indicia.
Referring again to FIG. 6, the CCD camera 94 captures the image and extracts the matrix out of that image so that it can be stored in memory along with other information provided to the field reader 18, such as the location of inspection, etc. The reader has the capability to decode the matrix. In one embodiment, this function is disabled to prevent any compromise of the security of the overall system. The reader merely captures the I.D. matrix and transmits the image back to the host computer 14. Then, either on-line or at a later time, the field reader 18 calls up the host 14 and downloads the series of ones and zeros. The host computer 14 has the ability to decode the I.D. matrix and determine if a valid or invalid code is present. In addition, the host can utilize all the encoded information to inform the inspector concerning tracking/diverting problems. In an alternate embodiment, the reader 18 decodes the image and transmits an ASCII string representing the image back to the host 14 for authentication, rather than transmitting the total image.
Upon inspection at various locations, e.g., postal inspection stations, the goods are scanned for a representative mark or symbol. Either confirmation of marking or confirmation of specific data can be determined. This may require modem 26 (see FIG. 1b) connection between the local reading terminal 22 and the host computer 14 where the encoded information is secured and stored. Comparison of the mark or symbol with the stored data enables both detection and tracking of authentic goods, as well as detection of counterfeit goods lacking the necessary mark or symbol of authenticity.
In a preferred embodiment, the host computer 14 utilized in the encoding/decoding system consists of a personal computer with serial and parallel interface, VGA monitor, keyboard, an Intel Pentium processor, a 400 meg HDD, 3.5' FDD, and 9600 baud modem. The host computer 14 is interfaced with an encoder/decoder which generates or decodes matrix codes for downloading to the marking system 16. In addition, the host computer 14 accepts data from field readers and interfaces with the encoder/decoder to authenticate the captured matrix and then returns a valid/invalid signal to the field reader. As mentioned previously, the host computer 14 can alternately receive the image from the field reader 18 as an ASCII string.
The host computer 14 maintains a non-volatile record of serialized encoded messages downloaded to each marking system location, maintains production run data for each remote marking system, and maintains a database for the field reading system to aid in product tracking and authentication. In a preferred embodiment, the host computer communicates with field readers via ASCII 7 bits, 1 odd parity bit, 1 stop bit and 1 start bit. This communication allows the field readers to provide data to the host computer which can be processed, thus enabling detection of authentic and counterfeit goods.
In the preferred embodiment, the markings are made visible by irradiating light from a special lamp. The lamp provides a selected wavelength of light which illuminates the mark or symbol. As an example, UV and IR light may be used to illuminate printed marks utilizing UV and IR sensitive dyes as described above. An ink is selected which is compatible with a selected wavelength of light. In marking certain mailpieces and financial documents, the preferred light is IR which illuminates IR responsive dye. The preferred light form is UV light which collaborates with a UV responsive dye. When irradiated, the markings are then visible to a reader.
The field reading system 18 is used to verify valid indicia marking at any point in the mail distribution chain from the marker to delivery. The portable reader consists of a video or digital camera system with selected light sources for image acquisition (i.e., IR, UV and white light), a personal computer controller and software to capture, store, and enhance the quality of the image, and a modem for communicating with the host computer.
The host computer/field reader communication protocol is as follows. In a preferred embodiment, the field reader transmits I ASCII, 7 data bits, 1 odd parity bit, 1 stop bit, and 1 start bit. The field reader will also transmit an identification header (12 character text string), operator name (20 character text string), operator name (20 character text string), location, (20 character text string), and a digital image. The digital image is a 256×256 8 bit scale image transmitted in raster pattern from upper left to lower right pixels of the image.
The host computer 14 accepts remote field reader data, interfaces with the encoder/decoder, and returns a valid/invalid message to the field reader. The host computer 14 also provides the field reader with data listing all previous verifications of the encoded message in the form of monetary amount, route, date, time, location, operator, and valid/invalid status.
The inspecting agent can inspect different mailpiece mailpieces or goods produced under the control of one of a plurality of host computers 14. Within a single customer company, however, their symbology is typically proprietary. A company would not, for instance, even with identical equipment, be able to read another company's code. Each network has proprietary symbology developed specifically for that customer. The invention can, however, be used by postal or other agents to scan distributed by numerous companies. In this application, inspectors use the reader system by capturing the indicia image and pressing a button to indicate a certain company. As a practical matter, inspection occurs through the use of private inspectors and with postal service personnel. The customer may actually pays for a campaign, i.e., a cycle or a 3 to 6 month campaign, depending on how extensive an inspection and tracking of mailpieces it desires. The invention places into the hands of the postal or other agents and/or paid customer field representatives a foolproof method of capturing the encoded images on mailpieces and other items, and verifying that the items are indeed legitimate or properly routed without expensive or extensive training. An added advantage of this system is the implementation of a system that avoids all the paperwork that the postal or private personnel would ordinarily require in inspections and making inspections more readily accessible.
The system does not require that the inspection agent operating the reader system even focus the camera. All that is required is that the reader system be turned on. The reader system is packaged in a briefcase and is typically comprised of a laptop computer, a battery pack and the hand held reader. The hand held reader may be attached by an umbilical cord or may operate independently of an umbilical cord. In addition, the reader may read a certain number of mailpieces, capture the information and subsequently be plugged into the laptop computer to download the information from the hand held reader to the laptop.
Another possible option uses a radio frequency transmission from the hand held reader back to the laptop. Regardless of the available technology, i.e., umbilical cord, radio frequency, or satellite, the information is captured and then downloaded. The information typically is going from an analog to a digital signal and into the laptop computer. An automatic dial up modem connects the laptop to the manufacturer's host computer. The host searches its archives for the captured information. The encryption unit decodes it and a signal is sent back to the laptop creating a display on the laptop screen which indicates whether the product is valid or invalid. Preferably, transmissions are in the form of ASCII strings as previously discussed, and not in the form of the much larger bitmap file. Also, information relating to previous inspection time, dates, and places can be placed on the screen. In other words, the goods can be traced anywhere along the distribution chain where those goods have been read or that shipment has been read and this information is archived in the host computer 14.
Once the image has been illuminated by the hand held reader, that image is captured and transferred to the laptop. An additional software package within the laptop enhances the image. The image is cleaned up in the laptop prior to transmission. If some fuzziness is present or the contrast is poor, the software package cleans up that image, in a manner known in the art, prior to transmitting back to the host computer 14 so that poor quality data is not transmitted. Once the mark has been verified as authentic, the inspector moves on to his next assignment. This inspection can be done in a post office, department store or at any place along the distribution chain i.e., customs or trucking terminals, flea markets, department stores, etc.
Each laptop or hand held reader is preprogrammed to recognize the user. When a user logs on, it identifies nomenclature chosen to establish communication with the appropriate computer. To gain access to the host computer 14 or to the control computer 12, the field inspector must properly identify himself. This may include a password in addition to his name. There will be a reader I.D. and an inspector I.D. The field inspector will be asked to enter his location, and then the time and date is automatically entered.
The laptop and the reader equipment can be purchased off the shelf. The CCD camera is commercially available also, but the light source has been added to illuminate the marks. The packaging of the components to make it user friendly is an aspect of the present invention.
The system also captures inspection and routing information. It actually tracks the actual routing through each inspection station or check point.
An audit trail is created through inspection that evidences what the field inspectors inspected and whether they check or merely spot check all of the mailpieces, goods or materials. When an invalid signal is received, this information can be stored. For both valid and invalid readings, the host computer will mark the code in the database indicating it was read on a particular date at a particular location. And if that item is read two or three places along the distribution chain, all that information will be in the host and will be downloaded to the laptop at the time that the mark is read. If counterfeit or diverted goods are identified, the field unit has the software that allows a manual input of bills of lading and purchase order data and/or the fact that it was obtained after inspection.
The system thereby enhances the quality of data gathered by the reader system. This is one of the prime objectives of the present invention. The field reader can be used to scan bills of lading and/or purchase orders so that such documentation can be associated with inspected mailpieces or goods.
In the U.S. or in highly developed countries where a sophisticated telephone system exists, a modem serves as the means for transmitting information from the field reader to the host computer and back to the field reader the previously disclosed embodiments. Also, in highly developed countries such as the U.S., transmission via cellular telephone is possible.
If on the other hand, inspection in third world countries is necessary, a satellite system is available that will allow the field reader to uplink to the satellite, down to a ground station, and back to the host. Whether it is the reader to the host or whether it is the marking system to the host, in terms of modems and phone lines, the Internet, satellite, private phone lines, private satellite systems, any commonly known method of transmitting data may be employed. Digital data will be transmitted by the most convenient method.
While the foregoing is directed to the preferred embodiment, the scope thereof is determined by the claims which follow.

Claims (45)

What is claimed is:
1. A method of dispensing postage to and identifying a mailpiece, the method comprising the steps of:
(a) providing a control computer to control and enable a host computer by providing an allotment of postage to said host computer;
(b) enabling said host computer to direct a printer to print an indicia symbol onto said mailpiece as evidence of paid postage and containing non postage related information unique to said mailpiece;
(c) scanning said mailpiece with a field reader to capture said symbol imprinted thereon; and
(d) verifying the authenticity of said symbol.
2. The method of claim 1 wherein said verification of authenticity of said symbol comprises the steps of:
(a) transferring said captured symbol to said control computer;
(b) comparing within said control computer said captured symbol with a data base of encoded symbols; and
(c) transmitting to said field reader an indication of the result of the comparison.
3. The method of claim 2 comprising the additional steps of:
(a) providing a plurality of said indicia printers; and
(b) directing said plurality of indicia printers with said host computer.
4. The method of claim 2 comprising the additional steps of:
(a) providing a plurality of host computers; and
(b) enabling said plurality of host computers with said control computer.
5. The method of claim 2 comprising the additional steps of:
(a) providing a plurality of said field readers;
(b) transferring said captured symbol from each said field reader to said control computer;
(c) comparing within said control computer said captured symbol with a data base of encoded symbols; and
(d) transmitting to each said field reader capturing said symbol an indication of the result of said comparison of symbols captured by that field reader.
6. The method of claim 1 wherein the step of scanning said mailpiece comprises illuminating said symbol on said mailpiece with a light source having a specified frequency range to illuminate said imprinted symbol.
7. The method of claim 1 wherein said host computer is enabled by said control computer through a security device comprising an enigma card.
8. The method of claim 7 comprising the additional step of auditing the activities of one or more of said host computers by electronically auditing said cooperating enigma cards.
9. The method of claim 7 comprising the additional step of auditing the activities of one or more of said indicia printers by electronically auditing said cooperating enigma cards.
10. The method of claim 7 comprising the additional step of auditing the activities of one or more of said host computers and one or more said indicia printers by electronically auditing said cooperating enigma cards.
11. A method of dispensing postage to, and tracking mailpieces, the method comprising the steps of:
(a) providing a control computer to control and enable at least one host computer by providing an allotment of indicia symbols to said host computer;
(b) enabling said host computer to direct at least one indicia printer to print an indicia symbol onto said mailpieces, wherein said symbol
(i) indicates the allotted postage fee paid for said mailpiece, and
(ii) provides mailpiece tracking information;
(c) scanning said mailpieces with a field reader to capture said symbol imprinted thereon;
(d) verifying the authenticity of said imprinted symbol using said captured symbol; and
(e) verifying said tracking information using said captured symbol.
12. The method of claim 11 wherein said host computer is enabled by said control computer through a security device comprising an enigma card.
13. The method of claim 12 wherein said verification of authenticity of said symbol comprises the steps of:
(a) transferring said captured symbol to said control computer;
(b) comparing within said control computer said captured symbol with a data base of encoded symbols; and
(c) transmitting to said field reader an indication of the result of said comparison.
14. The method of claim 13 wherein said step of verifying said tracking information comprises the steps of:
(a) converting tracking information contained in said symbol into clear text using said field reader; and
(b) confirming from said clear text the desired routing of said scanned mailpiece.
15. The method of claim 11 comprising the additional steps of:
(a) providing a plurality of host computer and enabling each said host computer with said control computer, through a security device comprising an enigma card and cooperating with that host computer, thereby providing an allotment of indicia symbols to each said host computer
(b) controlling a plurality of said indicia printers with each said host computer;
(c) providing a plurality of said field readers;
(d) transferring said captured symbol from each said field reader to said control computer;
(e) presenting said tracking information in clear text to an operator of each said field reader;
(f) comparing within said control computer said captured symbol with a data base of encoded, authentic symbols; and
(g) transmitting to said field reader capturing said symbol an indication of the result of said comparison.
16. The method of claim 11 including the additional steps of:
(a) scanning said imprinted symbol at said indicia printer; and
(b) verifying the accuracy of said imprinted symbol.
17. The method of claim 11 wherein the step of scanning said mailpieces comprises illuminating said symbol on each said mailpiece with a light source having a specified frequency range to illuminate said imprinted symbol so that said symbol can be captured by said field reader.
18. The method of claim 11 comprising the additional steps of:
(a) providing said field reader with a computer;
(b) verifying the authenticity of said symbol by comparing said captured symbol with a database of authentic symbols stored with said field reader computer.
19. The method of claim 11 comprising the additional steps of:
(a) providing said postal fee and said tracking information to said control computer in clear text;
(b) transmitting said clear text to said host computer;
(c) converting said clear text using an encryption unit so that said indicia symbol comprises encoded postal fee and tracking information.
20. The method of claim 11 further comprising the steps of:
(a) determining from said captured symbols a cumulative postal fee for all mailpieces scanned by said field reader; and
(b) comparing said cumulative postage fee with a cumulative postage fee allotted to said indicia printer.
21. The method of claim 11 comprising the additional steps of:
(a) forming said indicia symbol so that a first portion comprises postage fee information and a second portion comprises tracking information;
(b) when scanning said mailpiece with said field reader, distinguishing said first portion and said second portion of said captured mark; and
(c) transmitting said first portion to said control computer and transmitting said second portion to said host computer.
22. The method of claim 21 wherein said information contained in said first portion of said indicia mark is supplied by a postal service.
23. The method of claim 22 wherein said control computer is operate by said postal service.
24. The method of claim 22 wherein one or more host computers are operated by one or more customers of said postal service.
25. The method of claim 24 wherein said information contained in said second portion of said indicia mark is customer confidential supplied by each said customer.
26. A system of dispensing postage and identifying information to mailpieces, the system comprising:
(a) a control computer;
(b) at least one host computer which is provided an allotment of postage by said control computer;
(c) at least one printing system enabled by said host computer with said allotment of postage for imprinting an indicia symbol onto said mailpieces
(i) as evidence of paid postage, and
(ii) mailpiece identification data;
(d) at least one field reader to capture said symbol imprinted thereon; and
(e) means for verifying the authenticity of said symbol.
27. The system of claim 26 wherein said means for verifying the authenticity of said symbol comprising:
(a) a first modem for transferring said captured symbols to said control computer;
(b) a data base of authentic symbols stored within said control computer, wherein said captured symbol is verified by comparison with said data base of authentic symbols; and
(c) a second modem for transmitting to said field reader an indication of the result of the comparison.
28. The system of claim 26 wherein said field reader is remote from said host computer and said control computer.
29. The system of claim 26 comprising a plurality of printing systems enabled by a single host computer.
30. The system of claim 29 comprising a plurality of host computers enabled with said control computer.
31. The system of claim 26 further comprising a security device for each of said at least one host computers through which said allotment of postage is provided by said control computer.
32. A system for marking postage fee paid and tracking the distribution of mailpieces, comprising:
(a) an enabling control computer;
(b) at least one host computer in communication with said control computer;
(c) at least one printing system comprising
(i) a printer CPU in communication with said host computer, and
(ii) an indicia symbol marker; and
(d) at least one field reading system in communication with said control computer;
(e) wherein
(i) said control computer communicates with said host computer through a first coded communication to enable said host computer to coordinate marking of said mailpieces by providing said host with said allotment of indicia symbols, wherein said indica symbols contain postage fee information and non postage fee and delivery information unique to said mailpiece,
(ii) said host computer communicates with said printer CPU through a second coded communication to enable said symbol marker to print said indicia symbols as a pattern onto said mailpieces,
(iii) said field reading system scans said mailpieces thereby capturing said indicia symbol marks, and
(iv) said field reading system communicates with said control computer to compare said scanned patterns with a set of authenticated patterns entered into a data base on said control computer.
33. The system of claim 32 comprising an encryption unit cooperating with said host computer to form said second coded communication.
34. The system of claim 32 further comprising verification means comprising a CDD camera, wherein said CDD camera scans said indicia markings applied to said mailpieces and compares the scanned marks with the intended indicia markings encoded at and stored in said printer CPU.
35. The system of claim 34 wherein said field reading system comprises a PC.
36. The system of claim 35 further comprising a field reading system modem, wherein:
(a) said field reading system scans mailpieces and captures said indicia marks at various points in a mail distribution system;
(b) said PC transmits said captured marks via said modem to said control computer for verification, and
(c) said control computer transmits via said modem the results of said comparison to said field reader PC.
37. The system of claim 36 further comprising a PC software means wherein;
(a) said software system distinguishes a first portion of said captured mark comprises postage fee information and distinguishes a second portion comprises tracking information; and
(b) said PC transmits information in said first portion to said control computer and transmits information in said second portion to said host computer.
38. The system of claim 37 further comprising a data base of valid indicia marks stored within said PC, wherein said scanned marks are compared with authentic indicia markings encoded at and stored in said data base of said PC.
39. The system of claim 32 further comprising a security unit cooperating with each of at least said at least one host computers, wherein each said cooperating security unit passes only a first encoded communication directed to that host computer from said control computer.
40. A method of dispensing postage to, and tracking mailpieces, the method comprising the steps of:
(a) providing a control computer to control and enable at least one host computer by providing an allotment of indicia symbols to said host computer;
(b) enabling said host computer to direct at least one indicia printer to print an indicia symbol onto said mailpieces, wherein said symbol
(i) indicates the allotted postage fee paid for said mailpiece, and
(ii) provides mailpiece tracking information;
(c) scanning said mailpieces with a field reader which contains a computer to capture, in the form of a bitmap, said symbol imprinted thereon;
(d) verifying the authenticity of said imprinted symbol using said captured symbol; and
(e) verifying said tracking information using said captured symbol.
41. The method of claim 40 wherein said host computer is enabled by said control computer through a security device comprising an enigma card.
42. The method of claim 41 wherein said verification of authenticity of said symbol comprises the steps of:
(a) converting said bitmap to an ASCII string;
(b) transferring said ASCII string to said control computer;
(c) comparing within said control computer said transmitted ASCII string with a data base of encoded symbols; and
(d) transmitting to said field reader an indication of the result of said comparison.
43. The method of claim 42 wherein said step of verifying said tracking information comprises the steps of:
(a) converting tracking information contained in said symbol into clear text using said field reader; and
(b) confirming from said clear text the desired routing of said scanned mailpiece.
44. A system of dispensing postage and identifiers to mailpieces, the system comprising:
(a) a control computer;
(b) at least one host computer which is provided an allotment of postage by said control computer;
(c) at least one printing system enabled by said host computer with said allotment of postage for imprinting an indicia symbol onto said mailpieces as evidence of paid postage and containing mailpiece identification data;
(d) at least one field reader comprising a computer which is used to capture, in the form of a bitmap, said symbol imprinted thereon; and
(e) means for verifying the authenticity of said symbol.
45. The system of claim 44 wherein said means for verifying the authenticity of said symbol comprising:
(a) a first modem for transferring an ASCII string of said bitmap to said control computer, wherein said ASCII string is generated from said bitmap in said field reader computer;
(b) a data base of authentic symbols stored within said control computer, wherein said ASCII string is verified by comparison with said data base of authentic ASCII strings; and
(c) a second modem for transmitting to said field reader an indication of the result of the comparison.
US08/911,108 1994-04-14 1997-08-14 System for dispensing, verifying and tracking postage and other information on mailpieces Expired - Fee Related US5917925A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US08/911,108 US5917925A (en) 1994-04-14 1997-08-14 System for dispensing, verifying and tracking postage and other information on mailpieces

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US22766294A 1994-04-14 1994-04-14
US08/420,034 US5592561A (en) 1994-04-14 1995-04-11 Anti-counterfeiting system
US08/633,538 US6005960A (en) 1994-04-14 1996-04-17 Anti-counterfeiting system
US08/740,656 US5895073A (en) 1994-04-14 1996-10-31 Anti-counterfeiting system
US08/911,108 US5917925A (en) 1994-04-14 1997-08-14 System for dispensing, verifying and tracking postage and other information on mailpieces

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US08/740,656 Continuation-In-Part US5895073A (en) 1994-04-14 1996-10-31 Anti-counterfeiting system

Publications (1)

Publication Number Publication Date
US5917925A true US5917925A (en) 1999-06-29

Family

ID=46253603

Family Applications (1)

Application Number Title Priority Date Filing Date
US08/911,108 Expired - Fee Related US5917925A (en) 1994-04-14 1997-08-14 System for dispensing, verifying and tracking postage and other information on mailpieces

Country Status (1)

Country Link
US (1) US5917925A (en)

Cited By (177)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000063849A1 (en) * 1999-04-19 2000-10-26 Pitney Bowes Inc. Postage metering system having multiple currency capability
US6142380A (en) * 1998-09-30 2000-11-07 Pitney Bowes Inc. Usage of dual luminescent inks to produce a postal orienting and sorting identification mark for an information-based indicia
US6188997B1 (en) * 1999-04-19 2001-02-13 Pitney Bowes Inc. Postage metering system having currency synchronization
US6208910B1 (en) * 1999-04-23 2001-03-27 Pitney Bowes Inc. System and method for determining the location of a mail piece
US6226619B1 (en) * 1998-10-29 2001-05-01 International Business Machines Corporation Method and system for preventing counterfeiting of high price wholesale and retail items
US6240196B1 (en) * 1998-12-18 2001-05-29 Pitney Bowes Inc. Mail generation system with enhanced security by use of modified print graphic information
WO2001043053A2 (en) * 1999-11-16 2001-06-14 United States Postal Service Method for authenticating mailpieces
US6314193B1 (en) * 1998-01-15 2001-11-06 International Business Machines Corporation Method and device for localizing and detecting plastic strips and window areas on mail
US20020026430A1 (en) * 2000-08-28 2002-02-28 Pitney Bowes Incorporated Mail piece verification system having forensic accounting capability
US20020029249A1 (en) * 2000-03-17 2002-03-07 Campbell Leo J. Methods and systems for providing an electronic account to a customer
US6356196B1 (en) * 2000-09-29 2002-03-12 Jaesent Inc. Verified receipt, notification, and theft deterrence of courier-delivered parcels
US6354501B1 (en) 1998-11-18 2002-03-12 Crossoff Incorporated Composite authentication mark and system and method for reading the same
WO2002021372A1 (en) * 2000-09-05 2002-03-14 United States Postal Service Marketing bar code method for distribution of promotional pieces
WO2002021391A2 (en) * 2000-09-08 2002-03-14 United States Postal Service Systems and methods for testing a delivery system
WO2002025597A1 (en) * 2000-09-21 2002-03-28 Pitney Bowes Inc. System for detecting mail pieces with duplicate indicia
US6370844B1 (en) 2000-01-31 2002-04-16 Eveready Battery Company, Inc. Product packaging arrangement using invisible marking for product orientation
US6381342B2 (en) * 1999-01-13 2002-04-30 James E. Foley Method for reading and sorting documents
US20020082853A1 (en) * 2000-12-21 2002-06-27 Doug Goodwin Photo Delivery System
US20020083020A1 (en) * 2000-11-07 2002-06-27 Neopost Inc. Method and apparatus for providing postage over a data communication network
US20020083021A1 (en) * 2000-12-27 2002-06-27 Pitney Bowes Incorporated Mail piece verification system
US6427021B1 (en) * 1998-12-02 2002-07-30 Pitney Bowes Inc. Recording graphical and tracking information on the face of a mailpiece
US20020128914A1 (en) * 1999-12-28 2002-09-12 Pitney Bowes Incorporated, World Headquarters Method and system for returning a non-scale-based parcel weight
US20020131618A1 (en) * 2001-03-16 2002-09-19 Benedikt Ahlers Apparatus and method for detecting the authenticity of secured documents
WO2002080520A2 (en) * 2001-03-30 2002-10-10 Siemens Dematic Postal Automation, L.P. Method and system for image processing
WO2002082235A2 (en) * 2001-04-06 2002-10-17 United States Postal Service Return merchandise processing system
WO2002082212A2 (en) * 2001-04-03 2002-10-17 United States Postal Service Systems and methods for capturing mail for electronic bill presentment
GB2376332A (en) * 2001-03-16 2002-12-11 Post Office Authenticating postage marks
US6520407B1 (en) * 1997-11-04 2003-02-18 Siemens Aktiengesellschaft Method and system for recognizing routing information on letters and parcels
US20030046103A1 (en) * 2001-05-16 2003-03-06 Michael Amato Dynamic change of address notification
WO2003023677A1 (en) * 2001-09-07 2003-03-20 United States Postal Service Item tracking and anticipated delivery confirmation system method
US6536672B1 (en) * 1998-11-18 2003-03-25 Dna Technologies, Inc. Product authentication system and method
US20030079137A1 (en) * 2001-10-24 2003-04-24 Kraft Clifford H. System and method of identifying sender of mail
US20030080182A1 (en) * 2001-10-25 2003-05-01 Gunther William G. Distribution based postage tracking system and method
US20030097287A1 (en) * 2001-10-05 2003-05-22 United Parcel Service Of America, Inc. Inbound and outbound shipment notification methods and systems
US6571223B1 (en) * 1999-10-28 2003-05-27 Vaghi Family Intellectual Properties, Llc System and method generating postal/carrier rates using encoded information
US20030101147A1 (en) * 2001-11-20 2003-05-29 Psi Systems, Inc. Auditable and secure systems and methods for issuing refunds for misprints of mail pieces
US20030101143A1 (en) * 2001-11-20 2003-05-29 Psi Systems, Inc. Systems and methods for detecting postage fraud using a unique mail piece indicium
US20030101148A1 (en) * 2001-11-20 2003-05-29 Psi Systems, Inc. Systems and methods for detecting postage fraud using an indexed lookup procedure
US20030102376A1 (en) * 2001-07-31 2003-06-05 Hand Held Products, Inc. Image device having indicia-controlled image parsing mode
US20030118191A1 (en) * 2001-12-21 2003-06-26 Huayan Wang Mail Security method and system
NL1019682C2 (en) * 2001-12-31 2003-07-01 Neopost Ind B V Method and computer program for monitoring the transport of objects.
US20030129111A1 (en) * 2001-12-07 2003-07-10 Miller Jimmie D. Method and apparatus for sterilizing mail
WO2003058202A2 (en) * 2001-12-31 2003-07-17 Lockheed Martin Corporation System and method of detecting, neutralizing, and containing suspected contaminated articles
WO2003058284A1 (en) * 2001-12-31 2003-07-17 Lockheed Martin Corporation Methods and system for hazardous material early detection for use with mail and other objects
US20030140016A1 (en) * 2001-12-10 2003-07-24 Philip Grotsky Mailer-ID
US20030163470A1 (en) * 2002-02-27 2003-08-28 Donald Wadley Method and system for mailing an object
US20030182216A1 (en) * 2003-03-05 2003-09-25 Baca Dennis M. Resource recovery and recycling system and method
US20030206643A1 (en) * 2002-05-02 2003-11-06 Pitney Bowes Incorporated Method and system for identifying mail pieces having similar attributes to suspected contaminated mail pieces
US20030208411A1 (en) * 2000-06-19 2003-11-06 Jacquelyn Estes System, method, and article of manufacture for shipping a package privately to a customer
AU768373B2 (en) * 2000-09-20 2003-12-11 Kabushiki Kaisha Toshiba Stamp detecting device, stamp detecting method, letter processing apparatus and letter processing method
US20030236757A1 (en) * 2000-07-25 2003-12-25 Sadler John J. Item attribute preverification
US20040039712A1 (en) * 2000-06-19 2004-02-26 Tartal William W Systems and methods for providing mail item retrieval
US20040039634A1 (en) * 2001-08-30 2004-02-26 Cook Thomas J Marketing bar code method for distribution of promotional pieces
US20040078112A1 (en) * 2000-12-01 2004-04-22 United States Postal Service System and method for directly connecting an advanced facer canceler system to a delivery bar code sorter
US20040074957A1 (en) * 2001-02-20 2004-04-22 Devar Rodney C Universal delivery and collection box unit (udcbu)
US20040089482A1 (en) * 1991-04-10 2004-05-13 Uship Intellectual Properties, Llc Automated package shipping machine
US20040096081A1 (en) * 2001-02-02 2004-05-20 Rudi Denzer Method and device for monitoring stamps on mail
US20040122780A1 (en) * 2002-04-02 2004-06-24 Devar Rodney C Universal delivery and collection box unit
US20040128265A1 (en) * 2002-04-05 2004-07-01 Holtz Lyn M. Return mechandise processing system
US20040133524A1 (en) * 2001-04-12 2004-07-08 Chamberlain Charles R. Systems and methods for electronic postmarking of data including location data
US20040139033A1 (en) * 2001-04-09 2004-07-15 Amato Michael J. System and method for predelivery notification using mail image
US20040148355A1 (en) * 2000-06-20 2004-07-29 Krause Robert G. System and methods for electronic message content identification
US6804379B2 (en) * 1994-03-17 2004-10-12 Digimarc Corporation Digital watermarks and postage
US20040215368A1 (en) * 2002-12-24 2004-10-28 Baker Christopher A. System and method for tracking mailpieces
US6823237B1 (en) * 1998-08-17 2004-11-23 Pitney Bowes Inc. Method and system for regeneration of misprocessed mailpieces or the like
US20040249652A1 (en) * 2001-09-07 2004-12-09 Harry Aldstadt Item tracking and anticipated delivery confirmation system method
US20050031162A1 (en) * 2001-10-26 2005-02-10 Surya Sagi Document lifecycle tracking system and method for use with a document production process
US20050097066A1 (en) * 2003-10-31 2005-05-05 Pitney Bowes Incorporated Method and system for a mailing machine to verify the integrity of printed postage
US6907132B1 (en) * 2000-10-12 2005-06-14 Pitney Bowes Inc. Method and system for producing robust indicia for digital printing and verification
WO2005057333A2 (en) * 2003-12-01 2005-06-23 United States Postal Service Method and system for providing a mail stamp unit assembly with tracking code
US6917924B1 (en) * 1991-04-10 2005-07-12 Uship Intellectual Properties, Llc Automated package shipping machine
US20050171919A1 (en) * 2004-02-03 2005-08-04 Baker Christopher A. Method for generating mailpieces and storing mailpiece identification and tracking information
WO2005076183A1 (en) * 2004-01-27 2005-08-18 United States Postal Service Standardizing iintelligent mail processing
US20050246359A1 (en) * 2000-02-09 2005-11-03 Ronald Robbins Delivery tracking system
US20060000892A1 (en) * 2004-07-01 2006-01-05 American Express Travel Related Services Company, Inc. Method for biometric security using a smartcard
US20060016870A1 (en) * 2004-07-01 2006-01-26 American Express Travel Related Services Company, Inc. Method and system for smellprint recognition biometrics on a smartcard
US20060016877A1 (en) * 2004-07-01 2006-01-26 American Express Travel Related Services Company, Inc. Biometric safeguard method with a smartcard
US20060036557A1 (en) * 2004-07-27 2006-02-16 Mattern James M Selectively expanding and printing indicia information
US20060101874A1 (en) * 2004-06-29 2006-05-18 Mikolajczyk Ryszard K Cluster box mail delivery unit having security features
US20060122947A1 (en) * 2004-12-08 2006-06-08 Lockheed Martin Corporation Automatic revenue protection and adjustment of postal indicia products
US20060122729A1 (en) * 2004-11-15 2006-06-08 Murphy Michael J System and method for dispensing, sorting and delivering prescription and non-prescription medications through the post office
US20060122949A1 (en) * 2004-12-08 2006-06-08 Lockheed Martin Corporation Customer software for use with automatic verification of postal indicia products
US7069247B1 (en) * 1999-12-13 2006-06-27 Ascom Hasler Mailing Systems, Inc. Authentication system for mail pieces
US20060158406A1 (en) * 2005-01-20 2006-07-20 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Semi-permanent electronic paper
US20060161977A1 (en) * 2005-01-20 2006-07-20 Jung Edward K Notarizable electronic paper
US20060173797A1 (en) * 2005-01-31 2006-08-03 Robert Sheehan Method for tracking mail piece data
US20060173798A1 (en) * 2005-01-31 2006-08-03 Pascal Charroppin Method of providing tracking numbers for a mail piece
US20060180661A1 (en) * 2005-02-03 2006-08-17 Elliott Grant Method and system for deterring product counterfeiting, diversion and piracy
US20060190418A1 (en) * 2005-02-24 2006-08-24 Michael Huberty System and method of postal-charge assessment
US20060238334A1 (en) * 2005-04-22 2006-10-26 Anthony Mangan IndeliTrak indelible tracking
US20060259773A1 (en) * 2005-05-12 2006-11-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Alert options for electronic-paper verification
US20060265584A1 (en) * 2003-09-04 2006-11-23 Fidalis Communication system for traceability monitoring
US20060265744A1 (en) * 2005-05-12 2006-11-23 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Write accessibility for electronic paper
US20060282903A1 (en) * 2005-06-08 2006-12-14 Jung Edward K User accessibility to electronic paper
US20070007341A1 (en) * 2005-07-08 2007-01-11 Lockheed Martin Corporation Automated postal voting system and method
US20070078797A1 (en) * 2005-10-11 2007-04-05 Electronics & Telecommunications Research Institute Method and system for parcel delivery in a ubiquitous environment and authenticaton server therefor
US20070085335A1 (en) * 2005-09-26 2007-04-19 Lampe Scott A Method of incorporating taggants into a packaging blank
US20070143621A1 (en) * 2005-01-20 2007-06-21 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Write accessibility for electronic paper
US20070150533A1 (en) * 2001-06-20 2007-06-28 United States Postal Service Systems and methods for electronic message content identification
US20070174217A1 (en) * 2006-01-23 2007-07-26 Neopost Technologies Method of paying for postage amounts via a telecommunications network
US20070175974A1 (en) * 2006-02-02 2007-08-02 Matthew Self System and method of code generation and authentication
US20070215685A1 (en) * 2005-02-03 2007-09-20 Yottamark, Inc. System and Method of Product Identification Using a URL
US7303139B1 (en) * 1998-02-20 2007-12-04 Kabushiki Kaisha Hitachi Seisakusho (Hitachi, Ltd.) System and method for identifying and authenticating accessories, auxiliary agents and/or fuels for technical apparatus
US7314164B2 (en) 2004-07-01 2008-01-01 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US7325724B2 (en) 2004-07-01 2008-02-05 American Express Travel Related Services Company, Inc. Method for registering a biometric for use with a smartcard
US7343351B1 (en) 1999-08-31 2008-03-11 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7363504B2 (en) 2004-07-01 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for keystroke scan recognition biometrics on a smartcard
US7370797B1 (en) 1996-05-31 2008-05-13 Scott Lindsay Sullivan Pill printing and identification
US20080148396A1 (en) * 2005-01-20 2008-06-19 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Notarizable electronic paper
US20080253560A1 (en) * 2005-02-03 2008-10-16 Elliott Grant Duo Codes for Product Authentication
US20090065568A1 (en) * 2007-09-07 2009-03-12 Elliott Grant Systems and Methods for Associating Production Attributes with Products
US7505941B2 (en) 1999-08-31 2009-03-17 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions using biometrics
EP2053563A1 (en) * 2007-10-23 2009-04-29 Neopost Technologies Systems and methods for the provision of postage
US20100006648A1 (en) * 2008-07-11 2010-01-14 Elliott Grant Mobile Table for Implementing Clamshell-to-Case Association
US20100040256A1 (en) * 2008-08-13 2010-02-18 Rundle Alfred T Mail piece identification using bin independent attributes
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US7686222B2 (en) 2001-07-13 2010-03-30 Hand Held Products, Inc. Optical reader having a color imager
US7690577B2 (en) 2001-07-10 2010-04-06 Blayn W Beenau Registering a biometric for radio frequency transactions
US20100100233A1 (en) * 2008-10-22 2010-04-22 Lockheed Martin Corporation Universal intelligent postal identification code
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US7766240B1 (en) 2008-07-19 2010-08-03 Yottamark, Inc. Case-Level Traceability without the need for inline printing
US7774606B2 (en) 2005-01-20 2010-08-10 The Invention Science Fund I, Inc Write accessibility for electronic paper
US7797543B1 (en) 1999-09-30 2010-09-14 United States Postal Service Systems and methods for authenticating an electronic message
US20100235290A1 (en) * 2000-05-12 2010-09-16 Nintendo Of America, Inc. Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection
US7814332B2 (en) 2001-07-10 2010-10-12 Blayn W Beenau Voiceprint biometrics on a payment device
US7835948B2 (en) 2006-09-07 2010-11-16 The Golub Corporation Floral network methods and systems for processing floral arrangements
US7882036B1 (en) * 2006-05-01 2011-02-01 Data-Pac Mailing Systems Corp. System and method for postal indicia printing evidencing and accounting
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US7909239B2 (en) 2007-09-07 2011-03-22 Yottamark, Inc. Attributing harvest information with unique identifiers
US7922088B2 (en) 2004-10-05 2011-04-12 Hand Held Products, Inc. System and method to automatically discriminate between different data types
US20110084127A1 (en) * 2009-10-08 2011-04-14 Elliott Grant Voice Code for Distribution Centers
US7988038B2 (en) 2001-07-10 2011-08-02 Xatra Fund Mx, Llc System for biometric security using a fob
US20110191249A1 (en) * 1999-08-31 2011-08-04 American Express Travel Related Services Company, Inc. Methods and Apparatus for Conducting Electronic Transactions
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US8005764B2 (en) 2004-12-08 2011-08-23 Lockheed Martin Corporation Automatic verification of postal indicia products
US20110215148A1 (en) * 2007-09-07 2011-09-08 Elliott Grant Attributing Harvest Information with Unique Identifiers
US8063878B2 (en) 2005-01-20 2011-11-22 The Invention Science Fund I, Llc Permanent electronic paper
US8095797B2 (en) 1999-09-30 2012-01-10 United States Postal Service Systems and methods for authenticating an electronic message
US8104686B2 (en) 2003-05-12 2012-01-31 Hand Held Products, Inc. Apparatus comprising image sensor
USRE43157E1 (en) 2002-09-12 2012-02-07 Xatra Fund Mx, Llc System and method for reassociating an account number to another transaction account
US8155313B2 (en) 2005-02-03 2012-04-10 Yottamark, Inc. Systems and methods for employing duo codes for product authentication
US8152063B1 (en) 2009-05-22 2012-04-10 Yottamark, Inc. Case labeling for field-packed produce
US8196827B1 (en) 2009-05-22 2012-06-12 Yottamark, Inc. Case labeling for field-packed produce
US8210430B1 (en) 2011-02-24 2012-07-03 Yottamark, Inc. Methods for assigning traceability information to and retrieving traceability information from a store shelf
US20120179769A1 (en) * 2001-04-09 2012-07-12 United States Postal Services System and method for predelivery notification using mail image
US8279042B2 (en) 2001-07-10 2012-10-02 Xatra Fund Mx, Llc Iris scan biometrics on a payment device
US8289136B2 (en) 2001-07-10 2012-10-16 Xatra Fund Mx, Llc Hand geometry biometrics on a payment device
US8294552B2 (en) 2001-07-10 2012-10-23 Xatra Fund Mx, Llc Facial scan biometrics on a payment device
US8428773B1 (en) 2008-02-12 2013-04-23 Yottamark, Inc. Systems and methods of associating individual packages with harvest crates
US8439262B2 (en) 2001-05-15 2013-05-14 Hand Held Products, Inc. Image capture apparatus and method
US8649512B2 (en) 2005-02-03 2014-02-11 Yottamark, Inc. Duo codes for product authentication
US8657200B2 (en) 2011-06-20 2014-02-25 Metrologic Instruments, Inc. Indicia reading terminal with color frame processing
US20140241569A1 (en) * 2011-10-04 2014-08-28 Deutsche Post Ag Automatic examination of value labels
US20140247962A1 (en) * 2011-10-04 2014-09-04 Deutsche Post Ag Method and device for marking value labels
US20140270356A1 (en) * 2013-03-15 2014-09-18 United States Postal Service Systems, methods and devices for item processing
US8887990B2 (en) 2007-09-07 2014-11-18 Yottamark, Inc. Attributing harvest information with unique identifiers
US8910860B2 (en) 2001-10-16 2014-12-16 Todd E Fitzsimmons Systems and method for providing information to a recipient of a physical mail object
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
USD745765S1 (en) 2005-06-29 2015-12-15 United States Postal Service Cluster box mail delivery unit
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
EP1410338B2 (en) 2000-08-28 2017-01-25 Pitney Bowes Inc. System and method for verifying digital postal marks
US9607189B2 (en) 2015-01-14 2017-03-28 Tactilis Sdn Bhd Smart card system comprising a card and a carrier
US9710777B1 (en) 2012-07-24 2017-07-18 Ports America Group, Inc. Systems and methods involving features of terminal operation including user interface and/or other features
US20170259585A1 (en) * 2016-03-09 2017-09-14 Bell And Howell, Llc Assemblies, systems, and methods for franking one or more sequential mailpiece on a high speed mail sorter
US9923950B1 (en) 2012-07-24 2018-03-20 Ports America Group, Inc. Systems and methods involving features of terminal operation including TOS-agnostic and/or other features
US10037528B2 (en) 2015-01-14 2018-07-31 Tactilis Sdn Bhd Biometric device utilizing finger sequence for authentication
US10291617B2 (en) 2015-05-12 2019-05-14 Valet Living Correctional postal mail contraband elimination system
US10395227B2 (en) 2015-01-14 2019-08-27 Tactilis Pte. Limited System and method for reconciling electronic transaction records for enhanced security
US10659630B2 (en) 2018-02-26 2020-05-19 HLFIP Holding, Inc. Correctional institution legal postal mail processing system and method
US10839388B2 (en) 2001-07-10 2020-11-17 Liberty Peak Ventures, Llc Funding a radio frequency device transaction
US10862891B2 (en) 2015-05-12 2020-12-08 HLFIP Holding, Inc. Communication tracking system for correctional facilities
US20210121921A1 (en) * 2018-07-16 2021-04-29 Lemo Maschinenbau Gmbh Individual identification of a bag and associated transport method
US11201974B2 (en) 2018-02-26 2021-12-14 HLFIP Holding, Inc. Systems and methods for processing requests to send private postal mail to an inmate
US11908035B2 (en) 2019-06-06 2024-02-20 Frederick Hutson System and method for authenticated mail

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3701165A (en) * 1971-04-29 1972-10-31 Oxford Industries Garments with detectable marks
US3839637A (en) * 1972-03-22 1974-10-01 A Willis Textile guiding and measuring indicia
US3942154A (en) * 1973-07-06 1976-03-02 Agency Of Industrial Science & Technology Method and apparatus for recognizing colored pattern
US3991706A (en) * 1976-01-20 1976-11-16 Gerber Garment Technology, Inc. Marking apparatus utilizing a dye thread
US4623579A (en) * 1983-10-04 1986-11-18 Multi-Tex Products Corp. Yarn product with combined fluorescent-phosphorescent appearance and method
US4660221A (en) * 1983-07-18 1987-04-21 Pitney Bowes Inc. System for printing encrypted messages with bar-code representation
US4767205A (en) * 1986-01-28 1988-08-30 Flow Cytometry Standards Corporation Composition and method for hidden identification
US4934846A (en) * 1988-02-29 1990-06-19 Alcatel Business Systems Limited Franking system
US5289547A (en) * 1991-12-06 1994-02-22 Ppg Industries, Inc. Authenticating method
US5319562A (en) * 1991-08-22 1994-06-07 Whitehouse Harry T System and method for purchase and application of postage using personal computer
US5390251A (en) * 1993-10-08 1995-02-14 Pitney Bowes Inc. Mail processing system including data center verification for mailpieces
US5592561A (en) * 1994-04-14 1997-01-07 Moore; Lewis J. Anti-counterfeiting system
US5798834A (en) * 1996-04-10 1998-08-25 Loral Defense Systems Interferometric fiber optic method and apparatus for obtaining absolute static measurement using an optical frequency-time profile

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3701165A (en) * 1971-04-29 1972-10-31 Oxford Industries Garments with detectable marks
US3839637A (en) * 1972-03-22 1974-10-01 A Willis Textile guiding and measuring indicia
US3942154A (en) * 1973-07-06 1976-03-02 Agency Of Industrial Science & Technology Method and apparatus for recognizing colored pattern
US3991706A (en) * 1976-01-20 1976-11-16 Gerber Garment Technology, Inc. Marking apparatus utilizing a dye thread
US4660221A (en) * 1983-07-18 1987-04-21 Pitney Bowes Inc. System for printing encrypted messages with bar-code representation
US4623579A (en) * 1983-10-04 1986-11-18 Multi-Tex Products Corp. Yarn product with combined fluorescent-phosphorescent appearance and method
US4767205A (en) * 1986-01-28 1988-08-30 Flow Cytometry Standards Corporation Composition and method for hidden identification
US4934846A (en) * 1988-02-29 1990-06-19 Alcatel Business Systems Limited Franking system
US5319562A (en) * 1991-08-22 1994-06-07 Whitehouse Harry T System and method for purchase and application of postage using personal computer
US5289547A (en) * 1991-12-06 1994-02-22 Ppg Industries, Inc. Authenticating method
US5390251A (en) * 1993-10-08 1995-02-14 Pitney Bowes Inc. Mail processing system including data center verification for mailpieces
US5592561A (en) * 1994-04-14 1997-01-07 Moore; Lewis J. Anti-counterfeiting system
US5798834A (en) * 1996-04-10 1998-08-25 Loral Defense Systems Interferometric fiber optic method and apparatus for obtaining absolute static measurement using an optical frequency-time profile

Cited By (381)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040089482A1 (en) * 1991-04-10 2004-05-13 Uship Intellectual Properties, Llc Automated package shipping machine
US6917924B1 (en) * 1991-04-10 2005-07-12 Uship Intellectual Properties, Llc Automated package shipping machine
US20080133372A1 (en) * 1991-04-10 2008-06-05 Ramsden Gary W Automated package shipping machine
US6804379B2 (en) * 1994-03-17 2004-10-12 Digimarc Corporation Digital watermarks and postage
US7370797B1 (en) 1996-05-31 2008-05-13 Scott Lindsay Sullivan Pill printing and identification
US20080290168A1 (en) * 1996-05-31 2008-11-27 Scott Lindsay Sullivan Pill printing identification
US8282006B2 (en) 1997-10-17 2012-10-09 Hand Held Products, Inc. Imaging device operative for image processing
US20050167504A1 (en) * 1997-10-17 2005-08-04 Meier Timothy P. Bar code reading device having image processing mode
US7841532B2 (en) 1997-10-17 2010-11-30 Hand Held Products, Inc. Bar code reading device having image processing mode
US20090200380A1 (en) * 1997-10-17 2009-08-13 Hand Held Products, Inc. Bar code reading device having image processing mode
US6520407B1 (en) * 1997-11-04 2003-02-18 Siemens Aktiengesellschaft Method and system for recognizing routing information on letters and parcels
US6314193B1 (en) * 1998-01-15 2001-11-06 International Business Machines Corporation Method and device for localizing and detecting plastic strips and window areas on mail
US7303139B1 (en) * 1998-02-20 2007-12-04 Kabushiki Kaisha Hitachi Seisakusho (Hitachi, Ltd.) System and method for identifying and authenticating accessories, auxiliary agents and/or fuels for technical apparatus
US6823237B1 (en) * 1998-08-17 2004-11-23 Pitney Bowes Inc. Method and system for regeneration of misprocessed mailpieces or the like
US6142380A (en) * 1998-09-30 2000-11-07 Pitney Bowes Inc. Usage of dual luminescent inks to produce a postal orienting and sorting identification mark for an information-based indicia
US6226619B1 (en) * 1998-10-29 2001-05-01 International Business Machines Corporation Method and system for preventing counterfeiting of high price wholesale and retail items
US6354501B1 (en) 1998-11-18 2002-03-12 Crossoff Incorporated Composite authentication mark and system and method for reading the same
US6536672B1 (en) * 1998-11-18 2003-03-25 Dna Technologies, Inc. Product authentication system and method
US6427021B1 (en) * 1998-12-02 2002-07-30 Pitney Bowes Inc. Recording graphical and tracking information on the face of a mailpiece
US6240196B1 (en) * 1998-12-18 2001-05-29 Pitney Bowes Inc. Mail generation system with enhanced security by use of modified print graphic information
US6381342B2 (en) * 1999-01-13 2002-04-30 James E. Foley Method for reading and sorting documents
US6178412B1 (en) * 1999-04-19 2001-01-23 Pitney Bowes Inc. Postage metering system having separable modules with multiple currency capability and synchronization
US6188997B1 (en) * 1999-04-19 2001-02-13 Pitney Bowes Inc. Postage metering system having currency synchronization
WO2000063849A1 (en) * 1999-04-19 2000-10-26 Pitney Bowes Inc. Postage metering system having multiple currency capability
US6208910B1 (en) * 1999-04-23 2001-03-27 Pitney Bowes Inc. System and method for determining the location of a mail piece
US8423476B2 (en) 1999-08-31 2013-04-16 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US8433658B2 (en) 1999-08-31 2013-04-30 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US8938402B2 (en) 1999-08-31 2015-01-20 Lead Core Fund, L.L.C. Methods and apparatus for conducting electronic transactions
US8489513B2 (en) 1999-08-31 2013-07-16 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US20110191248A1 (en) * 1999-08-31 2011-08-04 American Express Travel Related Services Company, Inc. Methods and Apparatus for Conducting Electronic Transactions
US20110191250A1 (en) * 1999-08-31 2011-08-04 American Express Travel Related Services Company, Inc. Methods and Apparatus for Conducting Electronic Transactions
US20100312667A1 (en) * 1999-08-31 2010-12-09 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US20110191249A1 (en) * 1999-08-31 2011-08-04 American Express Travel Related Services Company, Inc. Methods and Apparatus for Conducting Electronic Transactions
US8214299B2 (en) 1999-08-31 2012-07-03 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7505941B2 (en) 1999-08-31 2009-03-17 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions using biometrics
US8924310B2 (en) 1999-08-31 2014-12-30 Lead Core Fund, L.L.C. Methods and apparatus for conducting electronic transactions
US9519894B2 (en) 1999-08-31 2016-12-13 Gula Consulting Limited Liability Company Methods and apparatus for conducting electronic transactions
US7343351B1 (en) 1999-08-31 2008-03-11 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US8484479B2 (en) 1999-09-30 2013-07-09 The United States Postal Service Systems and methods for authenticating an electronic message
US9444625B2 (en) 1999-09-30 2016-09-13 United States Postal Service Systems and methods for authenticating an electronic message
US8095797B2 (en) 1999-09-30 2012-01-10 United States Postal Service Systems and methods for authenticating an electronic message
US7797543B1 (en) 1999-09-30 2010-09-14 United States Postal Service Systems and methods for authenticating an electronic message
US6571223B1 (en) * 1999-10-28 2003-05-27 Vaghi Family Intellectual Properties, Llc System and method generating postal/carrier rates using encoded information
WO2001043053A3 (en) * 1999-11-16 2002-01-24 Us Postal Service Method for authenticating mailpieces
WO2001043053A2 (en) * 1999-11-16 2001-06-14 United States Postal Service Method for authenticating mailpieces
US6527178B1 (en) 1999-11-16 2003-03-04 United States Postal Service Method for authenticating mailpieces
US7069247B1 (en) * 1999-12-13 2006-06-27 Ascom Hasler Mailing Systems, Inc. Authentication system for mail pieces
US20020128914A1 (en) * 1999-12-28 2002-09-12 Pitney Bowes Incorporated, World Headquarters Method and system for returning a non-scale-based parcel weight
US6370844B1 (en) 2000-01-31 2002-04-16 Eveready Battery Company, Inc. Product packaging arrangement using invisible marking for product orientation
US20090292682A1 (en) * 2000-02-09 2009-11-26 Ronald Robbins Delivery tracking system
US20050246359A1 (en) * 2000-02-09 2005-11-03 Ronald Robbins Delivery tracking system
US8356187B2 (en) 2000-03-17 2013-01-15 United States Postal Service Methods and systems for providing a secure electronic mailbox
US20050246550A1 (en) * 2000-03-17 2005-11-03 U.S. Postal Service Methods and systems for establishing an electronic account for a customer
US20020029249A1 (en) * 2000-03-17 2002-03-07 Campbell Leo J. Methods and systems for providing an electronic account to a customer
US8769632B2 (en) 2000-03-17 2014-07-01 United States Postal Service Methods and systems for providing a secure electronic mailbox
US8731953B2 (en) 2000-03-17 2014-05-20 United States Postal Service Methods and systems for linking an electronic address to a physical address of a customer using a delivery point identification key
US20020029248A1 (en) * 2000-03-17 2002-03-07 Cook Jon L. Method and systems for providing a secure electronic mailbox
US20020029279A1 (en) * 2000-03-17 2002-03-07 Campbell Leo J. Methods and systems for proofing identities using a certificate authority
US9363219B2 (en) 2000-03-17 2016-06-07 The United States Postal Service Methods and systems for providing an electronic account to a customer
US20080221913A1 (en) * 2000-03-17 2008-09-11 United States Postal Service Methods and systems for linking an electronic address to a physical address of a customer using a delivery point identification key
US20080320092A1 (en) * 2000-03-17 2008-12-25 United States Postal Service Methods and systems for providing an electronic account to a customer
US7484088B2 (en) 2000-03-17 2009-01-27 United States Postal Service Methods and systems for proofing identities using a certificate authority
US8429234B2 (en) 2000-03-17 2013-04-23 United States Postal Service Methods and systems for providing an electronic account to a customer
US20070169176A1 (en) * 2000-03-17 2007-07-19 Cook Jon L Methods and systems for providing a secure electronic mailbox
US20090031127A1 (en) * 2000-03-17 2009-01-29 United States Postal Service Methods and systems for proofing identities using a certificate authority
US20090031034A1 (en) * 2000-03-17 2009-01-29 United States Postal Service Methods and systems for proofing ldentities using a certificate authority
US20090138730A1 (en) * 2000-03-17 2009-05-28 United States Postal Service. Methods and Systems For Providing A Secure Electronic Mailbox
US20090187761A1 (en) * 2000-03-17 2009-07-23 United States Postal Service Methods and systems for proofing identities using a certificate authority
US7711950B2 (en) 2000-03-17 2010-05-04 United States Postal Services Methods and systems for establishing an electronic account for a customer
US20020059381A1 (en) * 2000-03-17 2002-05-16 Cook Jon L. Methods and systems for linking an electronic address to a physical address of a customer
US20020059430A1 (en) * 2000-03-17 2002-05-16 Orbke Wayne H. Methods and systems for establishing an electronic account for a customer
US7802093B2 (en) 2000-03-17 2010-09-21 United States Postal Service Methods and systems for proofing identities using a certificate authority
US7984289B2 (en) 2000-03-17 2011-07-19 United States Postal Service Methods and systems for establishing an electronic account for a customer
US8010686B2 (en) 2000-03-17 2011-08-30 United States Postal Service Methods and systems for proofing identities using a certificate authority
US8352551B2 (en) 2000-03-17 2013-01-08 United States Postal Service Methods and systems for providing an electronic account to a customer
US10587557B2 (en) 2000-03-17 2020-03-10 United States Postal Service Methods and systems for providing a secure electronic mailbox
US8161279B2 (en) 2000-03-17 2012-04-17 United States Postal Service Methods and systems for proofing identities using a certificate authority
US8209191B2 (en) 2000-03-17 2012-06-26 United States Postal Service Methods and systems for linking an electronic address to a physical address of a customer
US10659413B2 (en) 2000-03-17 2020-05-19 United States Postal Service Methods and systems for providing and electronic account to a customer
US20100235290A1 (en) * 2000-05-12 2010-09-16 Nintendo Of America, Inc. Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection
US8156026B2 (en) * 2000-05-12 2012-04-10 Nintendo of America Ltd. Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection
US7848961B2 (en) 2000-06-19 2010-12-07 The United States Postal Service System, method and article of manufacture for shipping a package privately to a customer
US7376598B2 (en) 2000-06-19 2008-05-20 United States Postal Service Method, system, and computer readable medium for shipping a package to a customer while preserving customer privacy
US20060074774A1 (en) * 2000-06-19 2006-04-06 United States Postal Service System, method, and article of manufacture for shipping a package privately to a customer
US20080172305A1 (en) * 2000-06-19 2008-07-17 United States Postal Service System, method and article of manufacture for shipping a package privately to a customer
US20030208411A1 (en) * 2000-06-19 2003-11-06 Jacquelyn Estes System, method, and article of manufacture for shipping a package privately to a customer
US20040039712A1 (en) * 2000-06-19 2004-02-26 Tartal William W Systems and methods for providing mail item retrieval
US7295997B2 (en) 2000-06-19 2007-11-13 United States Of America Postal Service Method for shipping a package privately to a customer
US6978929B2 (en) 2000-06-19 2005-12-27 The United States Postal Service Systems and methods for providing mail item retrieval
US8244809B2 (en) 2000-06-20 2012-08-14 United States Postal Service System and methods for electronic message content identification
US20040148355A1 (en) * 2000-06-20 2004-07-29 Krause Robert G. System and methods for electronic message content identification
US20030236757A1 (en) * 2000-07-25 2003-12-25 Sadler John J. Item attribute preverification
US7729957B2 (en) 2000-07-25 2010-06-01 United States Postal Service Item attribute preverification
US7707124B2 (en) * 2000-08-28 2010-04-27 Pitney Bowes Inc. Mail piece verification system having forensic accounting capability
EP1410338B2 (en) 2000-08-28 2017-01-25 Pitney Bowes Inc. System and method for verifying digital postal marks
US20020026430A1 (en) * 2000-08-28 2002-02-28 Pitney Bowes Incorporated Mail piece verification system having forensic accounting capability
WO2002021372A1 (en) * 2000-09-05 2002-03-14 United States Postal Service Marketing bar code method for distribution of promotional pieces
US7827048B2 (en) 2000-09-08 2010-11-02 United States Postal Service Systems and methods for testing a delivery system
US20030208370A1 (en) * 2000-09-08 2003-11-06 Wilson James D Systems and methods for testing a delivery system
WO2002021391A2 (en) * 2000-09-08 2002-03-14 United States Postal Service Systems and methods for testing a delivery system
WO2002021391A3 (en) * 2000-09-08 2002-06-27 Us Postal Service Systems and methods for testing a delivery system
AU768373B2 (en) * 2000-09-20 2003-12-11 Kabushiki Kaisha Toshiba Stamp detecting device, stamp detecting method, letter processing apparatus and letter processing method
WO2002025597A1 (en) * 2000-09-21 2002-03-28 Pitney Bowes Inc. System for detecting mail pieces with duplicate indicia
US6839693B1 (en) 2000-09-21 2005-01-04 Pitney Bowes Inc. System for detecting mail pieces with duplicate indicia
US6356196B1 (en) * 2000-09-29 2002-03-12 Jaesent Inc. Verified receipt, notification, and theft deterrence of courier-delivered parcels
US6907132B1 (en) * 2000-10-12 2005-06-14 Pitney Bowes Inc. Method and system for producing robust indicia for digital printing and verification
US20020083020A1 (en) * 2000-11-07 2002-06-27 Neopost Inc. Method and apparatus for providing postage over a data communication network
US8078314B2 (en) 2000-12-01 2011-12-13 United States Postal Service System and method for directly connecting an advanced facer canceler system to a delivery bar code sorter
US20080133049A1 (en) * 2000-12-01 2008-06-05 United States Postal Service System and method for directly connecting an advanced facer canceler system to a delivery bar code sorter
US7930062B2 (en) 2000-12-01 2011-04-19 United States Postal Service System and method for directly connecting an advanced facer canceler system to a delivery bar code sorter
US20040078112A1 (en) * 2000-12-01 2004-04-22 United States Postal Service System and method for directly connecting an advanced facer canceler system to a delivery bar code sorter
US20020082853A1 (en) * 2000-12-21 2002-06-27 Doug Goodwin Photo Delivery System
US7756795B2 (en) * 2000-12-27 2010-07-13 Pitney Bowes Inc. Mail piece verification system
WO2002051560A3 (en) * 2000-12-27 2002-11-21 Pitney Bowes Inc Mail piece verification system
US20020083021A1 (en) * 2000-12-27 2002-06-27 Pitney Bowes Incorporated Mail piece verification system
US20040096081A1 (en) * 2001-02-02 2004-05-20 Rudi Denzer Method and device for monitoring stamps on mail
US7529386B2 (en) * 2001-02-02 2009-05-05 Deutsche Post Ag Method and device for monitoring stamps on mail
US20040074957A1 (en) * 2001-02-20 2004-04-22 Devar Rodney C Universal delivery and collection box unit (udcbu)
US7337944B2 (en) 2001-02-20 2008-03-04 United States Postal Service Universal delivery and collection box unit (UDCBU)
US7092583B2 (en) * 2001-03-16 2006-08-15 Bundesdruckerei Gmbh Apparatus and method for detecting the authenticity of secured documents
GB2376332B (en) * 2001-03-16 2005-08-10 Post Office Authenticating postage marks
GB2376332A (en) * 2001-03-16 2002-12-11 Post Office Authenticating postage marks
US20020131618A1 (en) * 2001-03-16 2002-09-19 Benedikt Ahlers Apparatus and method for detecting the authenticity of secured documents
WO2002080520A3 (en) * 2001-03-30 2003-08-07 Siemens Dematic Postal Automat Method and system for image processing
WO2002080520A2 (en) * 2001-03-30 2002-10-10 Siemens Dematic Postal Automation, L.P. Method and system for image processing
US8521657B2 (en) 2001-04-03 2013-08-27 United States Postal Service Systems and methods for capturing mail for electronic bill presentment
US20040236584A1 (en) * 2001-04-03 2004-11-25 Kuebert Edward J Systems and methods for capturing mail for electronic bill presentment
WO2002082212A3 (en) * 2001-04-03 2003-07-03 Us Postal Service Systems and methods for capturing mail for electronic bill presentment
WO2002082212A2 (en) * 2001-04-03 2002-10-17 United States Postal Service Systems and methods for capturing mail for electronic bill presentment
US9852408B2 (en) 2001-04-03 2017-12-26 United States Postal Service Systems and methods for capturing mail for electronic bill presentment
WO2002082235A2 (en) * 2001-04-06 2002-10-17 United States Postal Service Return merchandise processing system
WO2002082235A3 (en) * 2001-04-06 2003-05-22 Us Postal Service Return merchandise processing system
US20120179769A1 (en) * 2001-04-09 2012-07-12 United States Postal Services System and method for predelivery notification using mail image
US20040139033A1 (en) * 2001-04-09 2004-07-15 Amato Michael J. System and method for predelivery notification using mail image
US9767496B2 (en) * 2001-04-09 2017-09-19 United States Postal Service System and method for predelivery notification using mail image
US10346891B2 (en) * 2001-04-09 2019-07-09 United States Postal Service System and method for predelivery notification using mail image
US7779481B2 (en) 2001-04-12 2010-08-17 United States Postal Service Systems and methods for electronic postmarking of data including location data
US20100332840A1 (en) * 2001-04-12 2010-12-30 United States Postal Service Systems and Methods for Electronic Postmarking of Data Including Location Data
US20040133524A1 (en) * 2001-04-12 2004-07-08 Chamberlain Charles R. Systems and methods for electronic postmarking of data including location data
US8439262B2 (en) 2001-05-15 2013-05-14 Hand Held Products, Inc. Image capture apparatus and method
US8794522B2 (en) 2001-05-15 2014-08-05 Hand Held Products, Inc. Image capture apparatus and method
US20030046103A1 (en) * 2001-05-16 2003-03-06 Michael Amato Dynamic change of address notification
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US20070150533A1 (en) * 2001-06-20 2007-06-28 United States Postal Service Systems and methods for electronic message content identification
US8166115B2 (en) 2001-06-20 2012-04-24 United States Postal Service Systems and methods for electronic message content identification
US8294552B2 (en) 2001-07-10 2012-10-23 Xatra Fund Mx, Llc Facial scan biometrics on a payment device
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US7988038B2 (en) 2001-07-10 2011-08-02 Xatra Fund Mx, Llc System for biometric security using a fob
US8279042B2 (en) 2001-07-10 2012-10-02 Xatra Fund Mx, Llc Iris scan biometrics on a payment device
US8289136B2 (en) 2001-07-10 2012-10-16 Xatra Fund Mx, Llc Hand geometry biometrics on a payment device
US7690577B2 (en) 2001-07-10 2010-04-06 Blayn W Beenau Registering a biometric for radio frequency transactions
US7886157B2 (en) 2001-07-10 2011-02-08 Xatra Fund Mx, Llc Hand geometry recognition biometrics on a fob
USRE45416E1 (en) 2001-07-10 2015-03-17 Xatra Fund Mx, Llc Processing an RF transaction using a routing number
US10839388B2 (en) 2001-07-10 2020-11-17 Liberty Peak Ventures, Llc Funding a radio frequency device transaction
US7814332B2 (en) 2001-07-10 2010-10-12 Blayn W Beenau Voiceprint biometrics on a payment device
US8284025B2 (en) 2001-07-10 2012-10-09 Xatra Fund Mx, Llc Method and system for auditory recognition biometrics on a FOB
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US8548927B2 (en) 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US8074889B2 (en) 2001-07-10 2011-12-13 Xatra Fund Mx, Llc System for biometric security using a fob
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US9336634B2 (en) 2001-07-10 2016-05-10 Chartoleaux Kg Limited Liability Company Hand geometry biometrics on a payment device
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US8528818B2 (en) 2001-07-13 2013-09-10 Hand Held Products, Inc. Optical reader having an imager
US8292180B2 (en) 2001-07-13 2012-10-23 Hand Held Products, Inc. Optical reader having an imager
US7686222B2 (en) 2001-07-13 2010-03-30 Hand Held Products, Inc. Optical reader having a color imager
US20030102376A1 (en) * 2001-07-31 2003-06-05 Hand Held Products, Inc. Image device having indicia-controlled image parsing mode
US20070198351A1 (en) * 2001-08-30 2007-08-23 United States Postal Service Marketing bar code method for distribution of promotional pieces
US20040039634A1 (en) * 2001-08-30 2004-02-26 Cook Thomas J Marketing bar code method for distribution of promotional pieces
WO2003023677A1 (en) * 2001-09-07 2003-03-20 United States Postal Service Item tracking and anticipated delivery confirmation system method
US20040249652A1 (en) * 2001-09-07 2004-12-09 Harry Aldstadt Item tracking and anticipated delivery confirmation system method
US8255235B2 (en) 2001-09-07 2012-08-28 United States Postal Service Item tracking and anticipated delivery confirmation system method
US8635078B2 (en) 2001-09-07 2014-01-21 United States Postal Service Item tracking and anticipated delivery confirmation system and method
US7698175B2 (en) * 2001-10-05 2010-04-13 United Parcel Service Of America, Inc. Inbound and outbound shipment notification methods and systems
US20030097287A1 (en) * 2001-10-05 2003-05-22 United Parcel Service Of America, Inc. Inbound and outbound shipment notification methods and systems
US8910860B2 (en) 2001-10-16 2014-12-16 Todd E Fitzsimmons Systems and method for providing information to a recipient of a physical mail object
US20030079137A1 (en) * 2001-10-24 2003-04-24 Kraft Clifford H. System and method of identifying sender of mail
US6817517B2 (en) 2001-10-25 2004-11-16 George Schmitt & Company, Inc. Distribution based postage tracking system and method
US20030080182A1 (en) * 2001-10-25 2003-05-01 Gunther William G. Distribution based postage tracking system and method
US7567941B2 (en) * 2001-10-26 2009-07-28 Pitney Bowes Inc. Document lifecycle tracking system and method for use with a document production process
US20050031162A1 (en) * 2001-10-26 2005-02-10 Surya Sagi Document lifecycle tracking system and method for use with a document production process
US20030101148A1 (en) * 2001-11-20 2003-05-29 Psi Systems, Inc. Systems and methods for detecting postage fraud using an indexed lookup procedure
US7831518B2 (en) 2001-11-20 2010-11-09 Psi Systems, Inc. Systems and methods for detecting postage fraud using an indexed lookup procedure
US20030101147A1 (en) * 2001-11-20 2003-05-29 Psi Systems, Inc. Auditable and secure systems and methods for issuing refunds for misprints of mail pieces
US10783719B2 (en) * 2001-11-20 2020-09-22 Psi Systems, Inc. Systems and methods for detecting postage fraud using an indexed lookup procedure
US8463716B2 (en) 2001-11-20 2013-06-11 Psi Systems, Inc. Auditable and secure systems and methods for issuing refunds for misprints of mail pieces
US20030101143A1 (en) * 2001-11-20 2003-05-29 Psi Systems, Inc. Systems and methods for detecting postage fraud using a unique mail piece indicium
US20110015935A1 (en) * 2001-11-20 2011-01-20 Psi Systems, Inc. Systems and methods for detecting postage fraud using an indexed lookup procedure
US6737029B2 (en) * 2001-12-07 2004-05-18 Jimmie D. Miller Method and apparatus for sterilizing mail
US20030129111A1 (en) * 2001-12-07 2003-07-10 Miller Jimmie D. Method and apparatus for sterilizing mail
US20030140016A1 (en) * 2001-12-10 2003-07-24 Philip Grotsky Mailer-ID
US20030118191A1 (en) * 2001-12-21 2003-06-26 Huayan Wang Mail Security method and system
US20030180138A1 (en) * 2001-12-31 2003-09-25 Rene Scheltes Method and computer program for monitoring the transport of objects in a distribution system
US7247865B2 (en) 2001-12-31 2007-07-24 Lockheed Martin Corporation System and method of detecting, neutralizing, and containing suspected contaminated articles
WO2003058202A3 (en) * 2001-12-31 2004-12-09 Lockheed Corp System and method of detecting, neutralizing, and containing suspected contaminated articles
US20030136920A1 (en) * 2001-12-31 2003-07-24 Lockheed Martin Corporation System and method of detecting, neutralizing, and containing suspected contaminated articles
WO2003058284A1 (en) * 2001-12-31 2003-07-17 Lockheed Martin Corporation Methods and system for hazardous material early detection for use with mail and other objects
EP1336928A1 (en) * 2001-12-31 2003-08-20 Neopost Industrie B.V. Method and computer program for monitoring the transport of objects in a distribution system
WO2003058202A2 (en) * 2001-12-31 2003-07-17 Lockheed Martin Corporation System and method of detecting, neutralizing, and containing suspected contaminated articles
NL1019682C2 (en) * 2001-12-31 2003-07-01 Neopost Ind B V Method and computer program for monitoring the transport of objects.
US20030163470A1 (en) * 2002-02-27 2003-08-28 Donald Wadley Method and system for mailing an object
US20040122780A1 (en) * 2002-04-02 2004-06-24 Devar Rodney C Universal delivery and collection box unit
US20040128265A1 (en) * 2002-04-05 2004-07-01 Holtz Lyn M. Return mechandise processing system
US20030206643A1 (en) * 2002-05-02 2003-11-06 Pitney Bowes Incorporated Method and system for identifying mail pieces having similar attributes to suspected contaminated mail pieces
US7024019B2 (en) * 2002-05-02 2006-04-04 Pitney Bowes Inc. Method and system for identifying mail pieces having similar attributes to suspected contaminated mail pieces
USRE43157E1 (en) 2002-09-12 2012-02-07 Xatra Fund Mx, Llc System and method for reassociating an account number to another transaction account
US20100169138A1 (en) * 2002-10-25 2010-07-01 Pitney Bowes Inc. Document lifecycle tracking system and method for use with a document production process
US20040230543A1 (en) * 2002-12-24 2004-11-18 Baker Christopher A. Method for retrieving mailpiece tracking details using mailpiece images
US20040215368A1 (en) * 2002-12-24 2004-10-28 Baker Christopher A. System and method for tracking mailpieces
US20030182216A1 (en) * 2003-03-05 2003-09-25 Baca Dennis M. Resource recovery and recycling system and method
US8104686B2 (en) 2003-05-12 2012-01-31 Hand Held Products, Inc. Apparatus comprising image sensor
US8789758B2 (en) 2003-05-12 2014-07-29 Hand Held Products, Inc. Picture taking reading apparatus
US20060265584A1 (en) * 2003-09-04 2006-11-23 Fidalis Communication system for traceability monitoring
US20050097066A1 (en) * 2003-10-31 2005-05-05 Pitney Bowes Incorporated Method and system for a mailing machine to verify the integrity of printed postage
EP1530167A2 (en) * 2003-10-31 2005-05-11 Pitney Bowes Inc. Method and system for a mailing machine to verify the integrity of printed postage
EP1530167A3 (en) * 2003-10-31 2006-08-16 Pitney Bowes Inc. Method and system for a mailing machine to verify the integrity of printed postage
WO2005057333A3 (en) * 2003-12-01 2005-12-08 Us Postal Service Method and system for providing a mail stamp unit assembly with tracking code
US20050211776A1 (en) * 2003-12-01 2005-09-29 Morgan Ray H Method and system for providing a mail stamp unit assembly with tracking code
WO2005057333A2 (en) * 2003-12-01 2005-06-23 United States Postal Service Method and system for providing a mail stamp unit assembly with tracking code
WO2005076183A1 (en) * 2004-01-27 2005-08-18 United States Postal Service Standardizing iintelligent mail processing
US20050171919A1 (en) * 2004-02-03 2005-08-04 Baker Christopher A. Method for generating mailpieces and storing mailpiece identification and tracking information
US8661862B2 (en) 2004-06-29 2014-03-04 The United States Postal Service Cluster box mail delivery unit having security features
US20060101874A1 (en) * 2004-06-29 2006-05-18 Mikolajczyk Ryszard K Cluster box mail delivery unit having security features
US8973812B2 (en) 2004-06-29 2015-03-10 The United States Postal Service Cluster box mail delivery unit having security features
US7530493B2 (en) 2004-07-01 2009-05-12 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using iris scan recognition
US7594612B2 (en) 2004-07-01 2009-09-29 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using retinal scan recognition
US7318550B2 (en) 2004-07-01 2008-01-15 American Express Travel Related Services Company, Inc. Biometric safeguard method for use with a smartcard
US7341181B2 (en) 2004-07-01 2008-03-11 American Express Travel Related Services Company, Inc. Method for biometric security using a smartcard
US7506806B2 (en) 2004-07-01 2009-03-24 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using fingerprint recognition
US7314164B2 (en) 2004-07-01 2008-01-01 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US7510115B2 (en) 2004-07-01 2009-03-31 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using auditory scan recognition
US20080067242A1 (en) * 2004-07-01 2008-03-20 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US7523860B2 (en) 2004-07-01 2009-04-28 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using facial scan recognition
US7533827B2 (en) 2004-07-01 2009-05-19 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using signature recognition
US7451924B2 (en) 2004-07-01 2008-11-18 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US20060016877A1 (en) * 2004-07-01 2006-01-26 American Express Travel Related Services Company, Inc. Biometric safeguard method with a smartcard
US7363504B2 (en) 2004-07-01 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for keystroke scan recognition biometrics on a smartcard
US7451925B2 (en) 2004-07-01 2008-11-18 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US7597265B2 (en) 2004-07-01 2009-10-06 American Express Travel Related Services Company, Inc. Method and system for vascular scan recognition with a smartcard
US20060016870A1 (en) * 2004-07-01 2006-01-26 American Express Travel Related Services Company, Inc. Method and system for smellprint recognition biometrics on a smartcard
US7314165B2 (en) 2004-07-01 2008-01-01 American Express Travel Related Services Company, Inc. Method and system for smellprint recognition biometrics on a smartcard
US7793845B2 (en) 2004-07-01 2010-09-14 American Express Travel Related Services Company, Inc. Smartcard transaction system and method
US20060000892A1 (en) * 2004-07-01 2006-01-05 American Express Travel Related Services Company, Inc. Method for biometric security using a smartcard
US7497375B2 (en) 2004-07-01 2009-03-03 American Express Travel Related Services Company, Inc. Smartcard transaction method and system using smellprint recognition
US7438234B2 (en) 2004-07-01 2008-10-21 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US7445149B2 (en) 2004-07-01 2008-11-04 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US8016191B2 (en) 2004-07-01 2011-09-13 American Express Travel Related Services Company, Inc. Smartcard transaction system and method
US7325724B2 (en) 2004-07-01 2008-02-05 American Express Travel Related Services Company, Inc. Method for registering a biometric for use with a smartcard
US20060036557A1 (en) * 2004-07-27 2006-02-16 Mattern James M Selectively expanding and printing indicia information
US7593857B2 (en) * 2004-07-27 2009-09-22 Neopost Technologies Selectively expanding and printing indicia information
US20110188752A1 (en) * 2004-10-05 2011-08-04 Hand Held Products, Inc. System and method to automatically discriminate between different data types
US8196842B2 (en) 2004-10-05 2012-06-12 Hand Held Products, Inc. System and method to automatically discriminate between different data types
US9317763B2 (en) 2004-10-05 2016-04-19 Hand Held Products, Inc. System and method to automatically discriminate between different data types
US7922088B2 (en) 2004-10-05 2011-04-12 Hand Held Products, Inc. System and method to automatically discriminate between different data types
US8636224B2 (en) 2004-10-05 2014-01-28 Hand Held Products, Inc. System and method to automatically discriminate between different data types
US7983995B2 (en) * 2004-11-15 2011-07-19 The Escher Group, Ltd. System and method for dispensing, sorting and delivering prescription and non-prescription medications through the post office
US20060122729A1 (en) * 2004-11-15 2006-06-08 Murphy Michael J System and method for dispensing, sorting and delivering prescription and non-prescription medications through the post office
US8005764B2 (en) 2004-12-08 2011-08-23 Lockheed Martin Corporation Automatic verification of postal indicia products
US8209267B2 (en) 2004-12-08 2012-06-26 Lockheed Martin Corporation Automatic revenue protection and adjustment of postal indicia products
US7937332B2 (en) 2004-12-08 2011-05-03 Lockheed Martin Corporation Automatic verification of postal indicia products
US20060122949A1 (en) * 2004-12-08 2006-06-08 Lockheed Martin Corporation Customer software for use with automatic verification of postal indicia products
US20060122947A1 (en) * 2004-12-08 2006-06-08 Lockheed Martin Corporation Automatic revenue protection and adjustment of postal indicia products
US20110215161A1 (en) * 2005-01-20 2011-09-08 Jung Edward K Y Write accessibility for Electronic paper
US20080148396A1 (en) * 2005-01-20 2008-06-19 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Notarizable electronic paper
US9734354B2 (en) 2005-01-20 2017-08-15 Invention Science Fund I, Llc Notarizable electronic paper
US8063878B2 (en) 2005-01-20 2011-11-22 The Invention Science Fund I, Llc Permanent electronic paper
US7643005B2 (en) 2005-01-20 2010-01-05 Searete, Llc Semi-permanent electronic paper
US8880890B2 (en) 2005-01-20 2014-11-04 The Invention Science Fund I, Llc Write accessibility for electronic paper
US7856555B2 (en) 2005-01-20 2010-12-21 The Invention Science Fund I, Llc Write accessibility for electronic paper
US7774606B2 (en) 2005-01-20 2010-08-10 The Invention Science Fund I, Inc Write accessibility for electronic paper
US8621224B2 (en) 2005-01-20 2013-12-31 The Invention Science Fund I, Llc Alert options for electronic-paper verification
US20070143621A1 (en) * 2005-01-20 2007-06-21 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Write accessibility for electronic paper
US20080134324A1 (en) * 2005-01-20 2008-06-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Notarizable electronic paper
US20060161977A1 (en) * 2005-01-20 2006-07-20 Jung Edward K Notarizable electronic paper
US20060158406A1 (en) * 2005-01-20 2006-07-20 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Semi-permanent electronic paper
US20110055587A1 (en) * 2005-01-20 2011-03-03 Jung Edward K Y Alert options for electronic-paper verification
US8640259B2 (en) 2005-01-20 2014-01-28 The Invention Science Fund I, Llc Notarizable electronic paper
US8281142B2 (en) 2005-01-20 2012-10-02 The Invention Science Fund I, Llc Notarizable electronic paper
US20060173797A1 (en) * 2005-01-31 2006-08-03 Robert Sheehan Method for tracking mail piece data
US20060173798A1 (en) * 2005-01-31 2006-08-03 Pascal Charroppin Method of providing tracking numbers for a mail piece
US20060180661A1 (en) * 2005-02-03 2006-08-17 Elliott Grant Method and system for deterring product counterfeiting, diversion and piracy
US20100299263A1 (en) * 2005-02-03 2010-11-25 Elliott Grant Method and System for Deterring Product Counterfeiting, Diversion and Piracy
US20070215685A1 (en) * 2005-02-03 2007-09-20 Yottamark, Inc. System and Method of Product Identification Using a URL
US8245927B2 (en) 2005-02-03 2012-08-21 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy
US20070170240A1 (en) * 2005-02-03 2007-07-26 Infinity Coding Solutions, Inc. Method and system for deterring product counterfeiting, diversion and piracy on a single system
US8300806B2 (en) 2005-02-03 2012-10-30 Yottamark, Inc. Duo codes for product authentication
US20070170241A1 (en) * 2005-02-03 2007-07-26 Infinity Coding Solutions, Inc. Method and system to provide security information when authenticating product code
US20080253560A1 (en) * 2005-02-03 2008-10-16 Elliott Grant Duo Codes for Product Authentication
US20100037297A1 (en) * 2005-02-03 2010-02-11 Elliott Grant Method and System for Deterring Product Counterfeiting, Diversion and Piracy
US8500015B2 (en) 2005-02-03 2013-08-06 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy
US8155313B2 (en) 2005-02-03 2012-04-10 Yottamark, Inc. Systems and methods for employing duo codes for product authentication
US8649512B2 (en) 2005-02-03 2014-02-11 Yottamark, Inc. Duo codes for product authentication
US7614546B2 (en) 2005-02-03 2009-11-10 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy
US7770783B2 (en) 2005-02-03 2010-08-10 Yottamark, Inc. Method and system to provide security information when authenticating product code
US7992772B2 (en) 2005-02-03 2011-08-09 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy on a single system
US20060190418A1 (en) * 2005-02-24 2006-08-24 Michael Huberty System and method of postal-charge assessment
US7248160B2 (en) 2005-04-22 2007-07-24 Pinpoint Logistics Systems, Inc. Computerized indelible tracking system
US20060238334A1 (en) * 2005-04-22 2006-10-26 Anthony Mangan IndeliTrak indelible tracking
US20060265744A1 (en) * 2005-05-12 2006-11-23 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Write accessibility for electronic paper
US7739510B2 (en) 2005-05-12 2010-06-15 The Invention Science Fund I, Inc Alert options for electronic-paper verification
US20060259773A1 (en) * 2005-05-12 2006-11-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Alert options for electronic-paper verification
US7865734B2 (en) * 2005-05-12 2011-01-04 The Invention Science Fund I, Llc Write accessibility for electronic paper
US7669245B2 (en) 2005-06-08 2010-02-23 Searete, Llc User accessibility to electronic paper
US20060282903A1 (en) * 2005-06-08 2006-12-14 Jung Edward K User accessibility to electronic paper
USD745765S1 (en) 2005-06-29 2015-12-15 United States Postal Service Cluster box mail delivery unit
USD821679S1 (en) 2005-06-29 2018-06-26 United States Postal Service Cluster box mail delivery unit
USD785274S1 (en) 2005-06-29 2017-04-25 United States Postal Service Cluster box mail delivery unit
USD855929S1 (en) 2005-06-29 2019-08-06 United States Postal Service Cluster box mail delivery unit
USD871713S1 (en) 2005-06-29 2019-12-31 The United States Postal Service Cluster box mail delivery unit
US20070007341A1 (en) * 2005-07-08 2007-01-11 Lockheed Martin Corporation Automated postal voting system and method
US7427025B2 (en) 2005-07-08 2008-09-23 Lockheed Marlin Corp. Automated postal voting system and method
US20070085335A1 (en) * 2005-09-26 2007-04-19 Lampe Scott A Method of incorporating taggants into a packaging blank
US20070078797A1 (en) * 2005-10-11 2007-04-05 Electronics & Telecommunications Research Institute Method and system for parcel delivery in a ubiquitous environment and authenticaton server therefor
US20070174217A1 (en) * 2006-01-23 2007-07-26 Neopost Technologies Method of paying for postage amounts via a telecommunications network
US7823768B2 (en) 2006-02-02 2010-11-02 Yottamark, Inc. System and method of code generation and authentication
US20070175974A1 (en) * 2006-02-02 2007-08-02 Matthew Self System and method of code generation and authentication
US7882036B1 (en) * 2006-05-01 2011-02-01 Data-Pac Mailing Systems Corp. System and method for postal indicia printing evidencing and accounting
US20110099125A1 (en) * 2006-05-01 2011-04-28 Yankloski Richard A System and method for postal indicia printing evidencing and accounting
US7835948B2 (en) 2006-09-07 2010-11-16 The Golub Corporation Floral network methods and systems for processing floral arrangements
US20110035300A1 (en) * 2006-09-07 2011-02-10 The Golub Corporation Network methods and systems for processing arrangements
US8600834B2 (en) 2006-09-07 2013-12-03 The Golub Corporation Network methods and systems for processing arrangements
US8825516B2 (en) 2007-09-07 2014-09-02 Yottamark, Inc. Methods for correlating first mile and last mile product data
US7909239B2 (en) 2007-09-07 2011-03-22 Yottamark, Inc. Attributing harvest information with unique identifiers
US20090065568A1 (en) * 2007-09-07 2009-03-12 Elliott Grant Systems and Methods for Associating Production Attributes with Products
US8342393B2 (en) 2007-09-07 2013-01-01 Yottamark, Inc. Attributing harvest information with unique identifiers
US8887990B2 (en) 2007-09-07 2014-11-18 Yottamark, Inc. Attributing harvest information with unique identifiers
US20110215148A1 (en) * 2007-09-07 2011-09-08 Elliott Grant Attributing Harvest Information with Unique Identifiers
EP2053563A1 (en) * 2007-10-23 2009-04-29 Neopost Technologies Systems and methods for the provision of postage
US7991707B2 (en) 2007-10-23 2011-08-02 Neopost Technologies Systems and methods for the provision of postage
US8428773B1 (en) 2008-02-12 2013-04-23 Yottamark, Inc. Systems and methods of associating individual packages with harvest crates
US20100006648A1 (en) * 2008-07-11 2010-01-14 Elliott Grant Mobile Table for Implementing Clamshell-to-Case Association
US8573476B2 (en) 2008-07-11 2013-11-05 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US8261973B2 (en) 2008-07-11 2012-09-11 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US8240564B2 (en) 2008-07-11 2012-08-14 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US7766240B1 (en) 2008-07-19 2010-08-03 Yottamark, Inc. Case-Level Traceability without the need for inline printing
US8085980B2 (en) 2008-08-13 2011-12-27 Lockheed Martin Corporation Mail piece identification using bin independent attributes
US20100040256A1 (en) * 2008-08-13 2010-02-18 Rundle Alfred T Mail piece identification using bin independent attributes
US20100100233A1 (en) * 2008-10-22 2010-04-22 Lockheed Martin Corporation Universal intelligent postal identification code
US8196827B1 (en) 2009-05-22 2012-06-12 Yottamark, Inc. Case labeling for field-packed produce
US8152063B1 (en) 2009-05-22 2012-04-10 Yottamark, Inc. Case labeling for field-packed produce
US8286869B1 (en) 2009-05-22 2012-10-16 Yottamark, Inc. Case labeling for field-packed produce
US20110084127A1 (en) * 2009-10-08 2011-04-14 Elliott Grant Voice Code for Distribution Centers
US8210430B1 (en) 2011-02-24 2012-07-03 Yottamark, Inc. Methods for assigning traceability information to and retrieving traceability information from a store shelf
US9384460B1 (en) 2011-02-24 2016-07-05 Trimble Navigation Limited Methods for assigning traceability information to and retrieving traceability information from a store shelf
US8474714B1 (en) 2011-02-24 2013-07-02 Yottamark, Inc. Methods for assigning traceability information to and retrieving traceability information from a store shelf
US8910875B2 (en) 2011-06-20 2014-12-16 Metrologic Instruments, Inc. Indicia reading terminal with color frame processing
US8657200B2 (en) 2011-06-20 2014-02-25 Metrologic Instruments, Inc. Indicia reading terminal with color frame processing
US9224059B2 (en) * 2011-10-04 2015-12-29 Deutsche Post Ag Automatic examination of value labels
US20140247962A1 (en) * 2011-10-04 2014-09-04 Deutsche Post Ag Method and device for marking value labels
US20140241569A1 (en) * 2011-10-04 2014-08-28 Deutsche Post Ag Automatic examination of value labels
US9923950B1 (en) 2012-07-24 2018-03-20 Ports America Group, Inc. Systems and methods involving features of terminal operation including TOS-agnostic and/or other features
US9710777B1 (en) 2012-07-24 2017-07-18 Ports America Group, Inc. Systems and methods involving features of terminal operation including user interface and/or other features
US9978034B1 (en) * 2012-07-24 2018-05-22 Ports America Group, Inc. Systems and methods involving features of terminal operation
US20190022707A1 (en) * 2013-03-15 2019-01-24 United States Postal Service Systems, methods and devices for item processing
US20200171551A1 (en) * 2013-03-15 2020-06-04 United States Postal Service Systems, methods and devices for item processing
US11759827B2 (en) * 2013-03-15 2023-09-19 United States Postal Service Systems, methods and devices for item processing
US9795997B2 (en) * 2013-03-15 2017-10-24 United States Postal Service Systems, methods and devices for item processing
US10549319B2 (en) * 2013-03-15 2020-02-04 United States Postal Service Systems, methods and devices for item processing
US20140270356A1 (en) * 2013-03-15 2014-09-18 United States Postal Service Systems, methods and devices for item processing
US10293380B2 (en) * 2013-03-15 2019-05-21 United States Postal Service Systems, methods and devices for item processing
US20170304872A1 (en) * 2013-03-15 2017-10-26 United States Postal Service Systems, methods and devices for item processing
US10275768B2 (en) 2015-01-14 2019-04-30 Tactilis Pte. Limited System and method for selectively initiating biometric authentication for enhanced security of financial transactions
US9607189B2 (en) 2015-01-14 2017-03-28 Tactilis Sdn Bhd Smart card system comprising a card and a carrier
US10229408B2 (en) 2015-01-14 2019-03-12 Tactilis Pte. Limited System and method for selectively initiating biometric authentication for enhanced security of access control transactions
US10223555B2 (en) 2015-01-14 2019-03-05 Tactilis Pte. Limited Smart card systems comprising a card and a carrier
US10147091B2 (en) 2015-01-14 2018-12-04 Tactilis Sdn Bhd Smart card systems and methods utilizing multiple ATR messages
US10037528B2 (en) 2015-01-14 2018-07-31 Tactilis Sdn Bhd Biometric device utilizing finger sequence for authentication
US10395227B2 (en) 2015-01-14 2019-08-27 Tactilis Pte. Limited System and method for reconciling electronic transaction records for enhanced security
US10862891B2 (en) 2015-05-12 2020-12-08 HLFIP Holding, Inc. Communication tracking system for correctional facilities
US10291617B2 (en) 2015-05-12 2019-05-14 Valet Living Correctional postal mail contraband elimination system
US11457013B2 (en) 2015-05-12 2022-09-27 HLFIP Holding, Inc. Correctional postal mail contraband elimination system
US9969179B2 (en) * 2016-03-09 2018-05-15 Fluence Automation Llc Assemblies, systems, and methods for franking one or more sequential mailpiece on a high speed mail sorter
US20170259585A1 (en) * 2016-03-09 2017-09-14 Bell And Howell, Llc Assemblies, systems, and methods for franking one or more sequential mailpiece on a high speed mail sorter
US11201974B2 (en) 2018-02-26 2021-12-14 HLFIP Holding, Inc. Systems and methods for processing requests to send private postal mail to an inmate
US10659630B2 (en) 2018-02-26 2020-05-19 HLFIP Holding, Inc. Correctional institution legal postal mail processing system and method
US11637940B2 (en) 2018-02-26 2023-04-25 HLFIP Holding, Inc. Correctional institution legal postal mail processing system and method
US20210121921A1 (en) * 2018-07-16 2021-04-29 Lemo Maschinenbau Gmbh Individual identification of a bag and associated transport method
US11908035B2 (en) 2019-06-06 2024-02-20 Frederick Hutson System and method for authenticated mail

Similar Documents

Publication Publication Date Title
US5917925A (en) System for dispensing, verifying and tracking postage and other information on mailpieces
US6246778B1 (en) Product distribution verification system using encoded marks indicative of product and destination
US6456729B1 (en) Anti-counterfeiting and tracking system
US5895073A (en) Anti-counterfeiting system
US5592561A (en) Anti-counterfeiting system
US6005960A (en) Anti-counterfeiting system
US6701304B2 (en) Method and apparatus for postage label authentication
RU2305866C2 (en) Important document and protective designation with marking substance
CA2265326C (en) Unique identifier bar code on stamps and apparatus and method for monitoring stamp usage with identifier bar codes
US4463250A (en) Method and apparatus for use against counterfeiting
CA2446814C (en) Method and system for validating a security marking
DE3752390T2 (en) An automated transaction system having a modular print head having a print-authorizing feature
EP0331352B2 (en) Franking system
KR100976435B1 (en) Method and device for coding articles
US6142380A (en) Usage of dual luminescent inks to produce a postal orienting and sorting identification mark for an information-based indicia
US11853843B2 (en) Authentication system
US20010041214A1 (en) System for retrospective identification and method of making articles for retrospective identification
US9010654B2 (en) Monitoring moving articles
US20100027851A1 (en) Apparatus, method and process for the stochastic marking and tracking of printed products
CA2544393A1 (en) Authentication and tracking system
EP1696391A2 (en) System and method of postal-charge assessment
US20080046384A1 (en) Postage verification apparatus and methods
US11037172B2 (en) Method and system for marking an item, an item so marked and a method and system for authenticating a marked item
CA2238196C (en) Method and system for automatic recognition of digital indicia images deliberately distorted to be non readable
CN109643362A (en) It provides and reads the label on article

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FPAY Fee payment

Year of fee payment: 8

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20110629